Shaarli export of all bookmarks on Tue, 28 May 19 08:07:17 -0400

Why local governments are a hot target for cyberattacks | CSO Online
ESP8266 Upgrade Gives IKEA LEDs UDP Superpowers | Hackaday
Auction for a laptop full of malware closes at $1.2 million
A threat actor scans Windows systems for BlueKeep vulnerability | Born's Tech and Windows World
SignalsEverywhere: ADS-B Aircraft Tracking with RTL-SDR, dump1090 and Virtual Radar Server
Short Article Explaining DSP Basics Without Math
Assessing your disk performance and your needs: Choosing your Azure storage disks (Part 3) – Dynamics AX in the Field
Walmart's New Way To Cut Health Costs: Better Medical Imaging For Workers : Shots - Health News : NPR
Accountability vs. responsibility | Seth's Blog
PerfView Hard Core CPU Investigations (Using CPU Counters) on Windows 10 – Vance Morrison's Weblog
Office 2016 vs. Office 365: Differences and Licensing | Windows OS Hub
Pragmatic Debian packaging (2019) | Vincent Bernat
Microsoft 365 Licensing Diagrams | Alexander's Blog
Intel Loses 5X More Average Performance Than AMD From Mitigations: Report
UPenn Medicine's AI tool for data analytics is open-source, free to the public
OpenJDK 8 and 11: Still in safe hands - Red Hat Developer Blog
Health Port: Creates Solution for Open Source Electronic Health Records
Bluetooth's Complexity Has Become a Security Risk | WIRED
WannaCry? Hundreds of US schools still haven’t patched servers [Updated] | Ars Technica
How To Enable Or Disable SSH Access For A Particular User Or Group In Linux? | 2daygeek.com
Moody's downgrades Equifax outlook to negative, cites cybersecurity
Lack of Secure Coding Called a National Security Threat
After 2 Years, WannaCry Remains a Threat - BankInfoSecurity
Here's all the important stuff Google announced at I/O 2019
MIT AI model is 'significantly' better at predicting breast cancer
Super Micro will move chip production out of China to avoid spying claims
A ransomware attack is holding Baltimore's networks hostage
A parent's guide to raising a good digital citizen
Hacker Summer Camp 2019 Preview · System Overlord
Windows Incident Response: Lessons From Time In The Industry
Geometry in Image Forensics – We are OSINTCurio.us
Basics of Breach Data – We are OSINTCurio.us
Security of Connected Vehicles - Part IRafeeq Rehman – Personal Blog
Mod Security Web Application Firewall
Scottish Government Security Basics
Cyber Essentials
Continuous Integration. Continuous Delivery. Continuous Security? - via @codeship | via @codeship
Ubiquiti Networks - Training Courses
Healthcare Exchange Standards: FHIR Security & Privacy activities
Singapore eHealth - Innovative Technologies and Security ~ Cyber Thoughts
Introduction to analysing full disk encryption solutions | DiabloHorn
Sunlight for the Ransomware Data Recovery Industry
Sodinokibi Ransomware Poised to Impact Larger Enterprises
DHS-CERT Alert 10KBLAZE | Onapsis
Beyond wealth: What happens AFTER you reach financial independence?
An introduction to square-foot gardening
Episode 19: Democratizing Cybersecurity | Linux Journal
Blindered by the GDPR | Linux Journal
All About ITIL Levels and Their Badges – Running Your Business
Kubernetes security: 4 strategic tips | The Enterprisers Project
WebAuthn Web Authentication with YubiKey 5 | Linux Journal
Java mon amour: good old friend JMeter
Vulnerability Management vendors and Vulnerability Remediation problems | Alexander V. Leonov
Code IB 2019: Vulnerability Management Masterclass | Alexander V. Leonov
First American security flaw leaked 885 million real estate documents
Ransomware attacks in US cities are using a stolen NSA tool
What Is UFS 3.0? — The Powerful Successor To microSD Memory Card
Here Are The Companies Who Have Banned Huawei
Huawei Cannot Use microSD Cards In Its Future Devices
How to Weaponize the Yubikey - Black Hills Information Security
Portable Retro Game Console with 7.9-inch display | Hackaday.io
Sound Card ADCs For Electrocardiograms | Hackaday
A Farmer’s Guide to Technology | Hackaday
Faxsploit – Exploiting A Fax With A Picture | Hackaday
What Happened With Supermicro? | Hackaday
Picking the Right Sensors for Home Automation | Hackaday
Making a Dash Button Update Your To-do List | Hackaday
Forget Artificial Intelligence; Think Artificial Life | Hackaday
Shadowhammer, WPA3, and Alexa is Listening: This Week in Computer Security | Hackaday
Windows Utility Helps ID Serial Ports | Hackaday
Building A Windows 10 1903 (May 2019 Update) Reference Image with MDT – Stick To The Script
Deploying A Windows 10 1903 (May 2019 Update) Reference Image with MDT – Stick To The Script
Configuring Oracle DB data source in JBoss EAP 7.1 - Blog dbi services
Documentum - Delete Remote Docbase - Strange behavior - Blog dbi services
The Smart Conference Badge We Almost Failed Shipping
Everything We Know About SpaceX’s Starlink Network | Hackaday
By The Numbers: Which Rapper’s Rhymes Are The Freshest? | Hackaday
Protecting Information Assets and IT Infrastructure in the Cloud | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
US companies waste over two months a year resetting passwords
.NET Framework is dead -- long live .NET 5
Lack of security and operations basics leave businesses unprepared for breaches
Three options companies should consider for backup & storage in 2019
Reported data breaches up more than 56 percent
Americans are overconfident about cybersecurity
New privacy regulations mean your company needs better data management now
46 percent of organizations consider taking personal data out of the cloud
New tool helps protect sensitive data on Oracle databases
Half of companies missed GDPR compliance deadline
Media server Serviio 2.0 adds multi-user streaming
The changing landscape of cybersecurity
Should I build a new media PC?
Windows 10 V1903: Security Baseline final released | Born's Tech and Windows World
David A. Wheeler's Blog
GDPR one year on -- what have we learned and what happens next?
72 percent of cyber security professionals have considered quitting over lack of resources
Cable Management Tips for Building Your New PC Like a Pro
The 12 Best Search Engines to Explore the Invisible Web
How to Install Windows 10 From a Bootable USB Drive
Providing Healthcare Information Services in Small and Rural Libraries » Public Libraries Online
The Illusion of "Doing Many Things" - briancasel.com
If You Worry About 768K Day, You’re Probably Doing Something Wrong « ipSpace.net blog
Ubiquitous VMware | Architecting IT
Quick post: DISM and Features on Demand (FOD) | >_
Talking to college students about information security · major.io
Video: Finding Performance Bottlenecks of Windows Based Systems with PowerShell – Mike F Robbins
Newbie Guide to Systems Engineering — ThinkCharles.net
New – Opt-in to Default Encryption for New EBS Volumes | AWS News Blog
Master VMware logging with these tools and strategies
The problem with Googling for solutions | The ORACLE-BASE Blog
Dissecting 190416 BP, PSU, RU and RUR - DBA - Rodrigo Jorge - Oracle Tips and Guides
Re-partitioning | Oracle Scratchpad
Storage Executive Software
Some Thoughts on Program-Level College Scorecard Data – Robert Kelchen
Digital Forensics vs. Computer Forensics - Data Narro, LLC
SQL Injection Protection - Data Security and Privacy - Thomas LaRock
Examples of using Machine Learning on Video and Photo in Public « Oralytics
Oracle ACE Program : How you "align" matters! | The ORACLE-BASE Blog
The Hidden Gem that is StorPool | Architecting IT
Some Btrfs vs Ext4 random-read/write performance observations | Ctrl blog
BlueKeep: Windows Remote Desktop Services vulnerability exploits status | Born's Tech and Windows World
Microsoft Azure Networking Slide Deck Is Ready « ipSpace.net blog
Measuring Linux IO read/write mix and size – The ongoing struggle
Connecting Go Lang to Oracle Database « Oralytics
Which JDK should I use now?
Java 8 vs Java 11 - What are the Key Changes?
5 of the Best LaTex Editors for Linux - Make Tech Easier
DevOps salaries: 10 statistics to see | The Enterprisers Project
Open source thermostat runs openHAB on a Raspberry Pi Zero W
Good News! Indian State Saves $428 Million by Choosing Linux
CGroup Interactions | Linux Journal
GitHub - arendst/Sonoff-Tasmota: Provide ESP8266 based itead Sonoff with Web, MQTT and OTA firmware using Arduino IDE or PlatformIO
Red Hat enables Lockheed Martin to deliver F-22 Raptor upgrades - Help Net Security
5 Open Source Wi-Fi Hotspot Solutions - DD-WRT, CoovaAP - Reports - LinuxPlanet - Linux Today Blog
PiShrink - Make Raspberry Pi Images Smaller - OSTechNix
How to Encrypt Linux Partitions with VeraCrypt on Ubuntu
Data in a Flash, Part II: Using NVMe Drives and Creating an NVMe over Fabrics Network | Linux Journal
DLNA server with MiniDLNA under Linux / Raspberry Pi – Unixblogger
Kubernetes - Role Based Access - The IT Hollow
88 Important Truths I’ve Learned About Life
How to Get Longer Life Out of Your Dell Laptop Battery | b3n.org
Activist hacking declined 95 percent since 2015
Activist hacking declined 95 percent since 2015
Career advice I wish I'd been given when I was young - 80,000 Hours
The State of IT Transformation: Legacy Infrastructure Jeopardizes Transformation Initiatives | APMdigest - Application Performance Management
Chris's Wiki :: blog/solaris/OmniOSNo10GCost
Chris's Wiki :: blog/sysadmin/InspectingTLSWithCertigo
Chris's Wiki :: blog/unix/XtermKeybinding
Blockchain for Impact: Blockchain Revolution Global Event Wrap-Up | Beth's Blog
Application-Focused Backups | Architecting IT
0day "In the Wild"
Oracle GoldenGate 19c is available for download for Linux
VDI 3D Graphics and Game Demo - Horizon, GRID, vGPU - The time I've wasted on technology...
Outsourcing my life: Why I pay others to do tasks I could do myself
‘Temporary Insanity’ Returns To Wall Street – The Felder Report
6 Tech Trends Dominating DevOps in 2019 – Running Your Business
4 Reasons Why Using Resumonk Can Help You Land the job You've Always Wanted – Business Ideas
5 Amazing Statistics About Remote Companies – Business Ideas
The Pink Tax: The Hidden Cost Of Being Female | Get Rich Slowly
Should You Care About an Inversion in the Yield Curve? – Business Ideas
Linux Scripting, Part II – DBAKevlar
You Don’t Want To Be A Rock Star | The Networking Nerd
Howto Reinstall WSUS from Scratch - The time I've wasted on technology...
Start with "Why?" | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
Droplet Computing: The Drip, Drip Effect – Michelle Laverick…
Mentoring Someone with Imposter Syndrome
[Howto] ara – making Ansible runs easier to read and understand – /home/liquidat
How to configure Windows Sandbox - Thomas Maurer
Best Practices for Signing a Windows PowerShell Script
Benchmarking Competencies for Digital Performance - Part 1 | APMdigest - Application Performance Management
Setup SSH Keys on Ubuntu 18.04 - Low End Box Low End Box
The Mythical Eight Hour Workday – Ethan Banks
Get Shortcut contents in Powershell – Dimitri's Wanderings
Powershell criticism: Part 2 – Dimitri's Wanderings
Powershell criticism part 1 – Dimitri's Wanderings
Start Stop service rights to non administrators – Dimitri's Wanderings
Architecture for the cloud vs. on-premises – Dimitri's Wanderings
Free Disk space on Windows drive – Dimitri's Wanderings
Chris's Wiki :: blog/linux/AlpineOverNFSFix
Chris's Wiki :: blog/linux/Ubuntu1804OddKernelPanic
Data Breach revealed 1.5 Million Freedom Mobile Customers | Born's Tech and Windows World
BitLocker management in enterprise environments | Born's Tech and Windows World
Fifty Questions to Ask a Startup Founder During an Informational Interview — Stephanie Hurlburt
Oracle 18c and 19c on Oracle Linux 8 (beta) | The ORACLE-BASE Blog
Oracle Senior Architect: Web Logic Server 11g
Writing Linux Scripts- Part I – DBAKevlar
Top 10 Oracle E-Business Suite Security Risks | Integrigy
Ethics in the AI, Machine Learning, Data Science, etc Era « Oralytics
Python transforming Categorical to Numeric « Oralytics
Data Sets for Analytics « Oralytics
Guide to using and installing WSUS on Windows Server Core 2019 - The time I've wasted on technology...
Machine Learning Tools and Workbenches « Oralytics
APEX Connect 2019 - Day 3 - Blog dbi services
APEX Connect 2019 - Day 2 - Blog dbi services
APEX Connect 2019 - Day 1 - Blog dbi services
IT And The Exception Mentality | The Networking Nerd
VCP6.7-DCV Objective 7.15 - Utilize VMware vSphere Update Manager (VUM) | ESX Virtualization
Fxmsp Chat Logs Reveal the Hacked Antivirus Vendors, AVs Respond
Data Protection in a Multi-Cloud World | Architecting IT
Making the Case for SAN 2.0 | Architecting IT
QLC NAND - What can we expect from the technology? | Architecting IT
SQL Server 2017 RTM CU14 + GDR Released - Microsoft Tech Community - 566368
OS/2 Museum | OS/2, vintage PC computing, and random musings
VCDX181.com - SAP grants support for SAP HANA 2.0 on VMware...
Run WSUS cleanup and index script on Windows Server Core without SQL Management Studio - The time I've wasted on technology...
VCP6.7-DCV Objective 2.3 - Describe the options for securing a vSphere environment | ESX Virtualization
Apple Patches ZombieLoad Vulnerabilities - TidBITS
Best Creamy Lemon Parmesan Chicken Recipe - How to Make Creamy Lemon Parmesan Chicken
CLI Still Sucks for Automation · Lindsay Hill
Amazon S3 Path Deprecation Plan – The Rest of the Story | AWS News Blog
How to list the naa-numbers of LUNs and VMware VMFSs on a Dell EMC Unity system - 50mu - about storage
Tom's Top Ten Things Executives Should Know About Software - ACM Queue
SAP on AWS Update – Customer Case Studies, Scale-Up, Scale-Out, and More | AWS News Blog
A List Of What Makes WiFi 6 Technically Better ? - EtherealMind
CCNA Training » OSPF Neighbor Sim
Real-Life Data Center Meltdown « ipSpace.net blog
Webcast – Install & Configure SQL Server with PowerShell DSC | SQLvariations: SQL Server, a little PowerShell, maybe some Power BI
Chatterbox is a DIY Kids Smart Speaker that Features Open-Source and Private Voice Assistant, Mycroft - Voicebot
Top list of computer forensics software – Linux Hint
Chris's Wiki :: blog/tech/TLSCertificateIdentity
Turbonomic 2019 State of Multi-Cloud Report – vcdx133.com
Japan Is Developing First Computer Virus To Prevent Cyber Crimes
Adding USB 3.0 Drivers to Windows 7 Install Media | Windows OS Hub
Improving Application Performance with NVMe Storage - Part 1 | APMdigest - Application Performance Management
New Security Baseline for both Windows 10 and Windows Server | KC's Blog
Powershell Backup Script-Sharing Knowledge | Erwin Bierens Blog
CentOS 7 – Windows Active Directory Integration using SSSD | geekdudes
The Idiot made a Smart Mirror – Jon Spraggins
Powershell Enable / Disable / Set / Show Windows Web Proxy-Sharing Knowledge | Erwin Bierens Blog
How to import your existing SSH keys into your GPG key ! even the horse knew
How to manage multiple SSH keys | Opensource.com
Dell Technologies World 2019 – (Fairly) Full Disclosure | PenguinPunk.net
D4stiny (Bill Demirkapi) · GitHub
18 Quick 'lsof' command examples for Linux Geeks
Raspberry Pi Streams Music Using Only the Default Linux Tools | Hackaday
Open source security: The risk issue is unpatched software, not open source use - Help Net Security
How to geotag photos on Linux with Otto | Tōkyō Made
Data in a Flash, Part I: the Evolution of Disk Storage and an Introduction to NVMe | Linux Journal
Routing from a single public IP with Azure Firewall -
dnsperf | DNS-OARC
GitHub - DNS-OARC/flamethrower: a DNS performance and functional testing utility (by @NS1)
New Features Coming to Debian 10 Buster Release - It's FOSS
Dell Technologies World 2019 – Media Session – Architecting Innovation in a Multi-Cloud World – Rough Notes | PenguinPunk.net
Dell Technologies World 2019 – Wednesday General Session – Optimism and Happiness in the Digital Age – Rough Notes | PenguinPunk.net
Dell Technologies World 2019 – Tuesday General Session – Innovation to Unlock Your Digital Future – Rough Notes | PenguinPunk.net
Dell Technologies World 2019 – Monday General Session – The Architects of Innovation – Rough Notes | PenguinPunk.net
Dell EMC Announces Unity XT And More Cloudy Things | PenguinPunk.net
Free Veeam VMCE Study Guide Download | ESX Virtualization
New – Amazon Managed Blockchain – Create & Manage Scalable Blockchain Networks | AWS News Blog
New – Amazon S3 Batch Operations | AWS News Blog
Building Serverless Pipelines with Amazon CloudWatch Events | AWS News Blog
hashing - Is there a built-in checksum utility on Windows 7? - Super User
certUtil -hashfile pathToFileToCheck [HashAlgorithm]
Design BOMs & my vSAN licensing cheat sheet mind map – Elastic Sky
vCenter Server Appliance CLI - JSON Creator · davidstamen.com
Blue circle in the vSphere client after upgrading to vCenter Server 6.7 Update 2 - ivobeerens.nl
Unimus
PCI ASV Partners - Clone Systems, Inc.
AWS re:Inforce 2019 – Security, Identity, and Compliance | AWS News Blog
Network Security right from the Beginning – Introducing DHCP-over-TLS (DoT) •
CISSP certificate - II. Personal experience - Security Art Work
CISSP certificate - I - Security Art Work
Helping CISOs and Board Members Communicate on Risk: A Shared Assessments Summit 2019 Recap | Security Architects Partners
Windows Incident Response: Registry Transaction Logs, pt II
Windows Incident Response: Latest Testing: The Windows Registry, pt I
Windows Incident Response: LNK Files In The Wild
Unhardened Web Servers in Tor Have No Anonymity – We are OSINTCurio.us
Certificates: The OSINT Gift that Keeps on Giving… – We are OSINTCurio.us
Basic OPSEC Tips & Tricks for OSINT researchers – We are OSINTCurio.us
So You Want to Red Team? · System Overlord
The Difference Between Classical Liberalism and Libertarianism | Daniel Miessler
Cybersecurity | Daniel Miessler
The Difference Between Goals, Strategies, Metrics, OKRs, KPIs, and KRIs | Daniel Miessler
Optimizing a Security Assessment Engagement
Django vs. the OWASP Top 10 - Part 1
SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 2 - strings and parameters | SANS Institute
SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code | SANS Institute
SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters | SANS Institute
Robert Penz Blog » Howto install Wireguard in an unprivileged container (Proxmox)
Security baseline (DRAFT) for Windows 10 v1903 and Windows Server v1903 – Microsoft Security Guidance blog
The Azure Security Model, Part 1 - Access Control Basics
Cyber Security First Step for Industrial IoT - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
SOAR: Doing More with Less
Google Online Security Blog: Gmail making email more secure with MTA-STS standard
Google Online Security Blog: The Android Platform Security Model
Errata Security: Programming languages infosec professionals should learn
USWDS: The United States Web Design System
Throw Away Drives | Diary of a Network Geek
California Assembly’s Privacy Committee Votes to Weaken Landmark Privacy Law | Electronic Frontier Foundation
Hardware Hacking 101 - Lesson 3: Abusing UART (U Are RooT) - The Ethical Hacker Network
The growing demand for managed detection and response (MDR) | CSO Online
Navigating the AI hype in security: 3 dos and 2 don'ts | CSO Online
Why your business continuity and disaster recovery plans should account for EMP attacks and GMD events | CSO Online
GandCrab attackers exploit recently patched Confluence vulnerability | CSO Online
Facebook Setting Aside Up To $5 Billion For Privacy Violations : NPR
Ransom amounts rise 90% in Q1 as Ryuk increases
Guide: Three Pillars of Preventing Business Email Compromise and Wire Fraud
Why Asset Management is so important for Vulnerability Management and Infrastructure Security? | Alexander V. Leonov
After Pentagon Ends Contract, Top-Secret Scientists Group Vows To Carry On : NPR
Cumulative Update #17 for SQL Server 2014 SP2 - Microsoft Tech Community - 462772
Largest Leak in History: Email Data Breach Exposes Over Two Billion Personal Records - CPO Magazine
Multiply time by asking 4 questions about the stuff on your to-do list |
Java mon amour: Jenkins enable project based security
Java mon amour: WebLogic Security documentation
The Wistar network emulator | Open-Source Routing and Network Simulation
3 Flourishing Sales Funnel Examples You Ought to Learn From – Online Businesses
Oracle Security Alert CVE-2019-2725
Intel’s Optane: Two Confusing Modes. Part 3) App Direct Mode | The SSD Guy
Oracle Database 19c (19.3) : Installations, RAC, Data Guard etc. | The ORACLE-BASE Blog
ncubeeight: My 20 years of web
Learn Ansible By Doing With These Courses And Hands-On Labs - Linux Academy
Early warning system | Joinup
blueprint for clinician-led open software design.
iLO recovery broken flash | panticz.de
Set Up ParseDMARC on Ubuntu 18.04, 16.04 Server to Analyze DMARC Reports
VMware ESXi Boot Failure from USB or SD Card with HPe iLO Amplifier and InfoSight - The time I've wasted on technology...
Blue Zones: Financial Lessons From the World’s Oldest People — My Money Blog
Big Data Is Big Business: Here's How to Become a Data Analyst
Market Guide for Cloud Workload Protection Platforms - Virsec Systems
Kanboard 1.2.7 Multiple Vulnerabilities
Threat Modeling Methodology | OCTAVE, STRIDE, PASTA,Trike, VAST
ZeroSec - Adventures In Information Security
ZephrFish (ZephrFish) / Repositories · GitHub
DNS Service Discovery (DNS-SD)
CoreDNS: DNS and Service Discovery
Pragmatic Blog: Denis Rechkunov – Paranoid Habits. Security Tips
Understand Your Sphere of Control | #Resolve2015 | Keri Duce | Gross, Point-Blank
Shadowing RDS 2012 Sessions – Ryan Mangan's IT Blog
GitHub - gabemarshall/eversec_ctf: Public repo for the Eversec CTF.
Correlating build numbers and versions of VMware products (1014508)
MARS_GUUG2016.pdf
Thomas_Schoebel-Theuer_-_MARS_Light__Replicating_Block_Devices_over_Long_Distances.e2308.pdf
The World's Largest Repository of Historical DNS data
Tell it to your Teddy Bear | Talk About Quality
Red Team Toolkit Essentials, Tim Roberts
Introducing: Detection Lab – Chris Long – Medium
Active Directory Visualization for Blue Teams and Threat Hunters
Three ways to pass credentials in a Powershell Script | Energized About PowerShell
Export all windows domain computers to CSV from windows | SvennD
EU law could fine sites for not removing terrorist content within an hour
GitHub - clong/DetectionLab: Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
The Journey to Try Harder: TJnull’s Preparation Guide for PWK/OSCP | NetSec Focus
DNS Ping Scans via Open Resolvers
Cybersecurity Bill Of Materials For Medical Devices: What’s Next
SPNEGO - Wikipedia
IEZoneAnalyzer v3.5 with Zone Map Viewer – Microsoft's USGCB Tech Blog
Slido - Audience Interaction Made Easy
Sidewalk Labs' street signs alert people to data collection in use
CIA claims Huawei is funded by Chinese state security
Chris's Wiki :: blog/links/SystemDashboardDesign
Using SetupDiag.exe to Diagnose Windows 10 Upgrade Errors | Windows OS Hub
Organizations Fail to Test Cybersecurity Incident Response Plans | APMdigest - Application Performance Management
How to Use the Microsoft Anti-Malware Script Interface
Java and Tomcat Updates : Vagrant and Docker | The ORACLE-BASE Blog
Linux Server Hardening Using Idempotency with Ansible: Part 3 | Linux.com | The source for Linux information
Cloud Security » Linux Magazine
WOPR: Security Loses Some of its Obscurity | Hackaday
Transcending the Stack with the Right Network Protocol | Hackaday
The CD Is 40, The CD Is Dead | Hackaday
The fast WekaIO file system saves you money! - FastStorage
Digital Trust & Safety: Go beyond fraud prevention with Sift | Sift
RSS Guard 3.5.7 - Neowin
VSCodium - The advanced editor
Top 25 Best Free Medical Imaging Software for Linux System
Cops Are Increasingly Using Google's Location History Data To Nab Criminals
Driftnet on Debian: Sniffing images within a network – Linux Hint
Data Collection Standards in Privacy Legislation: Proposed Language - Lawfare
Principles of AI Governance and Ethics Should Apply to All Technologies - Lawfare
Estate Planning for Your Digital Assets: Smart Planning for Your Digital Demise | DennisKennedy.Blog
Skills for Tech Pros of Tomorrow - Part 1 | APMdigest - Application Performance Management
Using SSH Keys to connect to your VPS – Low End Box
Linux Blackhole Tutorial – Adding and Removing A Null Route – Low End Box
Create Team and Channels with PowerShell |
Home Lab Information Management – Notes from MWhite
Monoprice Maker Ultimate 3D Printer Review: Part 1 - set up and initial print
Is it Elastalert? No – it’s NiFi!! – David Vassallo's Blog
Consuming Netflow using NiFi – David Vassallo's Blog
Early Retirement Extreme: — a combination of simple living, anticonsumerism, DIY ethics, self-reliance, resilience, and applied capitalism
What is a zombie (comatose) server, and why should I care?
Dread Pirate Roberts 2, the 'guiding mind' of Silk Road 2.0, jailed for over 5 years
Thomas White, the founder of notorious website Silk Road 2.0, has been jailed for five years and four months by a UK court. White, also known as Dread Pirate Roberts 2, was charged with not only running Silk Road 2.0 -- the site through which he earned hundreds of thousands of dollars per day on the dark web Silk Road 2.0 had been set up by White with Blake Benthall (also known as DefCon) from the US after the FBI closed down the original Silk Road marketplace in 2013. White's pseudonym (or one of them, at least), was a nod to Ross Ulbricht, who was arrested for running the first site and used the name Dread Pirate Roberts.
2019 Women in Tech Report - HackerRank
Tax identities up for sale on the dark web
previous year's W-2 forms and 1040 forms available on the dark web at relatively low cost, ranging from $1.04 to $52. Names, social security numbers and birthdates can be obtained for a price ranging from $0.19 to $62. There are also how-to guides on illicitly cashing out tax returns available for as little as $5.
PC-as-a-Service or managed device services? The difference matters
61 percent of CISOs believe employees have leaked data maliciously
79 percent of IT leaders believe that employees have put company data at risk accidentally in the last 12 months, and 61 percent believe they have done so maliciously.
8 out of 10 top vulnerabilities target Microsoft products
Eight out of 10 vulnerabilities exploited via phishing attacks, exploit kits, or RATs were targeting Microsoft products.
802.11ax Is NOT A Wireless Switch | The Networking Nerd
Data center and server room considerations: What you need to know
New VMware Security Advisory VMSA-2019-0006 - VMware Security & Compliance Blog - VMware Blogs
Rubrik Color-Coded VM Backup Reports – Virtually Sober
An Intro to OpenCensus - SFlanders
virt-install + nbdkit live install | Richard WM Jones
The Wide World of Microsoft Windows on AWS | AWS News Blog
Windows 10 1809 and later slow on VMware | blog.erben.sk
The issue is identified to be due to some guest OS behavior change in this version of windows 10, 1809 w.r.t thin provisioned disks and snapshots, this has been confirmed as a bug and will be fixed in the following releases – 6.5 U3 and 6.7U3, which will be released within End of this year (2019).
3-2-1 Backup Best Practices Using the Cloud
3 types of Navigation in SharePoint Online - SharePoint Maven
The world of cybersecurity in numbers
OSINT Framework | KC's Blog
The EU releases guidelines to encourage ethical AI development
Log2Ram: Extending SD Card Lifetime for Raspberry Pi LoRaWAN Gateway | MCU on Eclipse
Under The Stairs: PowerShell 7 - Coming Soon!
Windows hard disk space disappears – Offline files – MILOSZENGEL.com
Lynis Overview & Installation – Low End Box
Protecting the privacy interests of others – Blog FiascoBlog Fiasco
Comparing and Syncing IIS Configurations - Devops Blog
Top Colleges Aren't What You Think : NPR
How To SlipStream Latest VMware ESXi patches into an Installation ESXi ISO File | ESX Virtualization
Artificial Intelligence Could Improve Mammogram Accuracy : Shots - Health News : NPR
Freed from storage failure by FreeNAS - MYstIC G
Vrnetlab: Emulate networks using KVM and Docker | Open-Source Routing and Network Simulation
Screen and Web scraping
Automatic Clean-and-Updated Firewall Ruleset « ipSpace.net blog
First Look: Microsoft Healthcare Bot | Tallan Blog
15 Practical Python Set Examples with a Sample Program
Understanding lifecycle management complexity of datacenter topologies | the morning paper
CephFS: a beginner's guide – Marksei
joeware – never stop exploring… :) » Blog Archive » LDAP Ping and Determining Your Machine’s Site
Cloud computing simplified: a Berkeley view on serverless computing | the morning paper
Let’s talk about trace flags - Microsoft Tech Community - 386061
Cumulative Update #16 for SQL Server 2014 SP2 - Microsoft Tech Community - 391101
What if the Actual Execution Plan was always available for any query? - Microsoft Tech Community - 393387
How To Configure a Shared Mailbox in Office 365. – TDSheridan Lab
An example why NAT is NOT security | Sebastian Neef - 0day.work
Active Directory Audit: Why and How | Security Architects Partners
Ansible Dynamic Inventory for Proxmox | Lisenet.com :: Linux | Security | Networking
Healthcare Exchange Standards: State of Healthcare Provenance today
The 12 Worst Serverless Security Risks
Install OpenVAS (GVM) on Kali 2019
How CISOs should respond to the cybersecurity crisis
The Role of Analytics in Protecting Healthcare Data Privacy and Security
Trojan Horses for the Mind, Part 2 of Building Impactful Security Awareness Messaging
Trojan Horses for the Mind
Threat Detection for your Network using Kfsensor Honeypot
Comprehensive Guide on Netcat
In its ransomware response, Norsk Hydro is an example for us all
Historical Communications Security | Diary of a Network Geek
The buzz at RSA 2019: Cloud security, network security and more | CSO Online
Under Attack: Over Half of SMBs Breached Last Year
Threat Hunting 101: Not Mission Impossible for the ...
40% of Organizations Not Doing Enough to Protect ...
20 Years of STRIDE: Looking Back, Looking Forward - ...
Adam Shostack
6 Essential Skills Cybersecurity Pros Need to ...
The Matrix at 20: A Metaphor for Today's ...
12 tips for effectively presenting cybersecurity to the board | CSO Online
Windows security updates that require new registry keys | CSO Online
7 keys to a successful IT security career | CSO Online
The 6 biggest ransomware attacks of the last 5 years | CSO Online
Cr1ptT0r Ransomware Targets NAS Devices with Old Firmware
Dharma ransomware recovery rates fall as ransom demands skyrocket
How to rotate your source IP address - Black Hills Information Security
Oracle mail warns about a critical Java 8 update coming | Born's Tech and Windows World
Security: Windows-Spoofing via .reg files | Born's Tech and Windows World
Patch Lady – Domain admins and issues with KB4489878 @ AskWoody
DTrace for Windows available | Born's Tech and Windows World
This free AI reads X-rays as well as doctors
What about a 3D Printed Mini-ITX NAS Case? - briancmoses.com
Treat staff like adults and equals | The IT Skeptic
Invalid State of a Virtual Machine on VMWare ESXi | Windows OS Hub
4 ITSM Priorities for Digital Transformation | APMdigest - Application Performance Management
Under The Stairs: Moving from PowerShell Journeyman to PowerShell Master
How to Fix “Trust relationship has failed” Error
Upgrade Windows Server from Evaluation to Full
Desired State Configuration in PowerShell
Attach a USB Device to a Virtual Machine in VMware
How to Split a Windows Image File (WIM to SVM)
Automating The Installation Of VMware ESXi With PowerCLI
VMware: Change IOPS Limit From 1000 to 1 | PeteNetLive
Quick and Dirty Image Factory with MDT and PowerShell | Keith's Consulting Blog
Do You Need to Update KRBTGT Account Password? | KC's Blog
Chris's Wiki :: blog/tech/NVMeAndTechChange
Chris's Wiki :: blog/sysadmin/OurDNSCircularDependency
Check if Powershell Script is Running as Administrator using Snippet
Product roadmaps are inferior to product forecasts – Blog FiascoBlog Fiasco
Exploiting Poor SMB Configuration – ls /blog
gallery-dl - Download Image Galleries And Collections From The Command Line - Linux Uprising Blog
code integrity vs data security
The impact of the GDPR - privacy matters
openDCIM - Open Source Data Center Infrastructure Management
Security clashes with cloud: Offensive Security CEO talks cultural mindsets, leadership challenges | ZDNet
radare
FinalCrypt - Free One Time Pad Encryption
GitHub - google/grr: GRR Rapid Response: remote live forensics for incident response
MIG: Mozilla InvestiGator
GRR Rapid Response: remote live forensics for incident response - LinuxLinks
IOInsight
As Built Report | Tim Carman
Chinese Woman Carrying Malware Allegedly Got Into Mar-a-Lago
Mar-a-Lago's Security Problems Go Way Beyond a Thumb Drive | WIRED
Latest Ransomware 'Xwo' Attacks PCs With Default Passwords
Xwo
Format your log messages in Python - Blog - syslog-ng Community - syslog-ng Community
Security Researchers say Half Of Industrial Control System Networks Have Faced Cyber Attacks – ls /blog
5 open source tools for teaching young children to read | Opensource.com
USB4: What this future standard means for USB chaos and Thunderbolt 3 | PCWorld
The Best Antivirus Programs for Ubuntu - Make Tech Easier
Different Ways To List Directory Contents Without Using ls Command
Automation Could Help Organizations Manage Risk: Cybersecurity Research
Episode #206 Running Django in Production - [Talk Python To Me Podcast]
Former Senate IT worker pleads guilty to doxxing senators on Wikipedia
Microsoft is shutting down its HealthVault patient record service
US Household Spending Breakdown: Top 20% vs. Bottom 20% — My Money Blog
My life philosophy: 50 lessons from 50 years
The Best Business Books for Students Who Want to Be Financially Literate
UN says US fears over Huawei’s 5G are politically motivated
HCIBench 2.0 is Here! — ThinkCharles.net
Indian health agency exposes details on millions of pregnant women
Oracle 18c/19c and ActiveDirectory – Laurent Schneider
The Renaissance of Data ONTAP | Architecting IT
Windows Server 2019 Licensing Calculator - VirtuallyInclined.com
Windows Server 2019 Comparison | Microsoft
An Intro to Observability - SFlanders
Datera and the Rise of Enterprise Software-Defined Storage | PenguinPunk.net
New Veeam Backup & Replication Community Edition for home labs is free! | TinkerTry IT @ Home
Terence Luk: Using wmic (Windows Management Interface Command) to remotely uninstall applications
VAST Data – No More Tiers Means No More Tears? | PenguinPunk.net
Glenn K. Lockwood: VAST Data's storage system architecture
VAST decouples compute and storage – Blocks and Files
VAST Data's Universal filesystem – Blocks and Files
VAST Data: The first thing we do, let's kill all the hard drives – Blocks and Files
Spectre/Meltdown Performance Impact Across Eight Linux Distributions - Phoronix
Backups | Roadmap to Securing Your Infrastructure - Linux Academy Blog
Wiping harddisks in 2019 - Daniel Lange's blog
Essential System Tools: Firejail - Excellent Security Sandboxing - LinuxLinks
Protection Poker: An agile game for mitigating risk | Opensource.com
Antennas in Linux | Linux Journal
Kali Linux Forensics Tools – Linux Hint
SMB Exploited – ls /blog
Being open builds trust | Joinup
25 Most Common IoT Security Threats in an Increasingly Connected World
Economical append-only offsite backups with restic and Wasabi on Debian 10
AWS Careers: On the Road to All 9 AWS Certifications - Linux Academy Blog
MITRE names The Document Foundation as a CVE Numbering Authority (CNA) - The Document Foundation Blog
How to install the OpenVAS security audit tool on Ubuntu Server 18.04 - TechRepublic
sudo add-apt-repository ppa:mrazavi/openvas sudo apt-get update sudo apt install sqlite3 openvas9 libopenvas9-dev -y sudo greenbone-nvt-syncsudo greenbone-scapdata-sync sudo greenbone-certdata-sync sudo systemctl restart openvas-scanner sudo systemctl restart openvas-manager sudo systemctl restart openvas-gsa sudo systemctl enable openvas-scanner sudo systemctl enable openvas-manager sudo systemctl enable openvas-gsa sudo openvasmd --rebuild --progress --verbose sudo openvas-check-setup --v9
SAP Open Sources Java SCA Tool
Why Trust Is Key for Cyber-Security Risk Management
Open Source Healthcare Visualizations
“Severe” ransomware attack cripples big aluminum producer | Ars Technica
Happy Birthday SAP Linux Lab! | e3zine.com
NetBIOS Auxiliary Modules – ls /blog
HAProxy - a journey into multithreading (and SSL)
10 Excellent Web Project Management Software - LinuxLinks
These are the most insecure programming languages | ZDNet
How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business
LockerGoga: The Dangerously Changing Face Of Ransomware
What You Need to Know About the LockerGoga Ransomware - Security News - Trend Micro USA
Configure two node Squid (Proxy Server) Clustering using Pacemaker on CentOS 7 / RHEL 7
The Ingredients of a Successful Digital Transformation Strategy
GitHub - edmunds/shadowreader: Serverless load testing for replaying production traffic. Powered by AWS Lambda.
CopperheadOS' Android Pie update is now available for the Pixel & Pixel 2
CopperheadOS
5 Ceph storage questions answered and explained
Digital transformation, cultural modernization cannot be mutually exclusive - Federal News Network
How to Set Up OpenStreetMap Tile Server on Ubuntu 18.04
DSHR's Blog: Compression vs. Preservation
Key takeaways on upgrading to Java 12
JAVA 12 Series Index
Quick guide to typeperf for Windows performance monitoring | Erik Wramner
Oracle E Business Suite and Java Security What You Need to Know | Integrigy
Oracle RAC vs. SQL Server AG – DBAKevlar
DeployHappiness | Making Life Hard for a Phisher – How to Report a Phishing or Malicious Website
Fast copies with Solaris 11.4 | rootpool
Intel’s Optane: Two Confusing Modes. Part 2) Memory Mode | The SSD Guy
Intel’s Optane: Two Confusing Modes. Part 1) Overview | The SSD Guy
I can't stand world backup day | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
PSA: Isilon L3 cache does not enable with a 1:1 HDD:SSD ratio - FastStorage
How To Install SQL Server 2019 on Linux (CentOS) - Mohammad Darab
DHS issues warning about Medtronic implantable defibrillator flaws
iTWire - Norwegian firm attack likely through Microsoft Active Directory: claim
Norsk Hydro
Benchmarking A 10-Core Tyan/IBM POWER Server For ~$300 USD - Phoronix
Oracle vs. SQL Server Architecture – DBAKevlar
iLO - IPMI on HP servers | panticz.de
40 Linux Server Hardening Security Tips [2019 edition] - nixCraft
Bare-Bones Monitoring with Monit and RRDtool | Linux Journal
There’s Something About Service Accounts – Active Directory Security
What is SNIA’s Persistent Memory Programming Model? | The SSD Guy
Terence Luk: Security tab for Internet Explorer 11 displays a lock key icon for Internet, Local intranet, Trusted sites, and Restricted sites zones
Docker tips and tricks for your Go projects | Marco Franssen
VCP6.7-DCV Objective 1.10 - Describe a virtual machine (VM) file structure | ESX Virtualization
New – Gigabit Connectivity Options for Amazon Direct Connect | AWS News Blog
Azure Blueprints: ISO27001 Shared Services - Eric’s Azure Blog
GitHub - StreisandEffect/streisand: Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
vSphere 6.7 Basics – Part 2 – vCenter Server Appliance Install – vcdx133.com
Migrating DB2 Databases to Azure – DBAKevlar
Nested ESXi Templates - EverythingShouldBeVirtual
Azure Blueprints - Eric’s Azure Blog
Putting AWS security services to work for you | AWS News Blog
Alien Pastures » Explorations into the world of electronic music production
100 Useful Vim Commands That You'll Need Every day
The Quiet Spread of Data Brokers Selling Your Personal Information - TidBITS
Windows Persistence with PowerShell Empire
Businesses Warned of Malware Spread via LinkedIn Job Offers
Thousands of patients impacted by ransomware attack at medical billing company
Episode 008 - What is Software Testing? - The Evil Tester Show - EvilTester.com
Are there any programming Katas related to testing? - EvilTester.com
What is Software Testing And Why Do We Test Software? - EvilTester.com
Massive Database Leak Gives Us a Window into China’s Digital Surveillance State | Electronic Frontier Foundation
Learn about computer security with the Raspberry Pi and Kali Linux | Opensource.com
Powershell – Windows firewall rules with ports – Luka Gros
Defending Against Remote Desktop Protocol Attacks – The Back Room Tech
Powershell and Lotus Notes pt3 – Luka Gros
News about the broken MSComCTL.ocx updates on Office | Born's Tech and Windows World
MSComCTL.ocx
The Anatomy of an AWS Key Leak to a Public Code Repository | Technodrone
A brief history of the admins time | rootpool
Tech Refresh as Part of an Effective Vulnerability Management Program: Part Three - Delta Risk
Opening a New Door of Opportunity | Thom Langford
Axonius' 'Unsexy' Tool Wins RSAC Innovation Sandbox ...
Axonius
It's Time to Rethink Your Vendor Questionnaire
Vulnerability Management at Tinkoff Fintech School | Alexander V. Leonov
An all-in-one cyber toolkit for criminal investigations - Purdue University News
Equifax defends against scathing Senate report
Paravirtualization
Spy Games: the NSA and GCHQ Offer Their Software to the Open Source Community | Linux Journal
GitHub - eerotal/LibreSignage: An open source digital signage solution
13-Yr-Old Girl Arrested In Japan For Posting Infinite Loop Code
Linux In Safety-Critical Systems Is Coming Soon With Project ELISA
ELISA
iGen and Cyber Security Research | Whitepaper | SANS Institute
DIY Portable KVM Crashcart From Recycled Laptop Provides VGA Display and USB Keyboard Touchpad With Optional Raspberry Pi: 14 Steps
As the web turns 30, is it an out-of-control monster? - Japan Today
Assessing your disk performance and your needs: Analyzing collected data (Part 2) – Dynamics AX in the Field
Assessing your disk performance and your needs: Collecting relevant data (Part 1) – Dynamics AX in the Field
SignalsEverywhere Video: SDRAngel How to Receive Basics Tutorial
The Essential Microsoft Excel Formulas and Functions Cheat Sheet
The Problem With ERP - IT Jungle
Who Invented the First Computer and When? We Investigate
Changes to Garbage Collection in Java 12
Java mon amour: Kubernetes cheat sheet 2
Java mon amour: Kubernetes cheat sheet 3
IDEAS IN FOOD: Fried Angel Hair Parm
Here's Why IT Teams Spend Too Much Time on Network Troubleshooting | APMdigest - Application Performance Management
Making A Hammer With Beautiful Engravings | Hackaday
This Cardboard Box Can Tell You What It Sees | Hackaday
U.S. GAO - DOD Training: U.S. Cyber Command and Services Should Take Actions to Maintain a Trained Cyber Mission Force
Remembering Eisenhower’s Middle East Force Resolution - Lawfare
DSHR's Blog: Demand Is Far From Insatiable
Raspberry Pi based indoor air quality monitor « Dangerous Prototypes
DIY NAS: 2019 Edition - briancmoses.com
Pepperdata Releases Free Big Data Cloud Migration Cost Assessment | APMdigest - Application Performance Management
Reinventing ITSM? It's Not Going Away - Part 2 | APMdigest - Application Performance Management
Reinventing ITSM? It's Not Going Away - Part 1 | APMdigest - Application Performance Management
Which Windows Server 2019 Installation Option should I choose? - Thomas Maurer
Chris's Wiki :: blog/sysadmin/ScriptsPromptImprovements
PowerShell Automation Script for IIS installation and more. | Nerd Drivel
Spectre and VMWare – Stuff I'm Up To
Oracle 19c Automatic Indexing — How well it’s understood?
Get All DCs in the Entire Forest | Mohammed Wasay
Stop audio pops on Intel HD Audio · major.io
Downgrade HP TPM From TPM 2.0 to TPM 1.2 - Daniel Classon
Generating Various Types of Group Policy Reports | KC's Blog
Exploiting secondary data with NDAS from NetApp | Architecting IT
Applocker and PowerShell: how do they tightly work together? | >_
Degrading qemu performance in DooM – Virtually Fun
Getting started with Pulumi on Azure - Cloud for the win!
Pulumi
My awesome-podcasts List | Technodrone
Sysadmin Stories: Running Veeam PowerShell Scripts in Non-Interactive Mode - Credentials
End of an era, Linux to Deprecate a.out support – Virtually Fun
BlgNetAutoSol/2_Easy_Wins at master · writememe/BlgNetAutoSol · GitHub
Iranian hackers stole terabytes of data from software giant Citrix
Free Morningstar Premium Mutual Fund Reports via Public Library Card — My Money Blog
Warren Buffett CNBC Interview 2019 Full Video, Full Transcript, and Notes — My Money Blog
Personal Finance on a 3×5 Index Card: Classic and New Young Adult Version — My Money Blog
Big Data Is Big Business: Here's How to Become a Data Analyst
What is money for? An evening with Vicki Robin
Faster and bigger SSDs enable us to talk about something else than IOps - FastStorage
How To Create A Recovery Services Vault In Azure - Blog dbi services
Easter Egg in the Server Config Doc and How to configure Domino to restrict which groups can receive Internet mail | The Notes Guy in Seattle
Mark Zuckerberg outlines a 'privacy-focused' revamp of Facebook
Capsule8 Expands Linux-Based Threat Detection Platform for PCI DSS
How To Create Fillable PDF Forms With LibreOffice Writer - Linux Uprising Blog
SAP builds its own Java distribution | InfoWorld
NIST and DFARS and Cyber Compliance! (oh my) « Virginia PTAP at George Mason University
DFARS & NIST & Incident Reporting - Exostar NIST 800-171 - Exostar Documentation
Compliance with DFARS 252.204-7012 & NIST 800-171; Expect 2019 to be the year of audit and enforcement - CyberSheath
DFARS_final.pdf
a495389.pdf
1018805.pdf
More Than 22,000 Vulns Were Disclosed in 2018, 27% ...
7 cheap or free cyber security training resources | CSO Online
The cybersecurity legislation agenda: 5 areas to watch | CSO Online
The CSO and CPO role just dramatically expanded overnight | CSO Online
Bare-metal cloud servers vulnerable to Cloudborne flaw | CSO Online
The RDP Through SSH Encyclopedia - Black Hills Information Security
Ransomware attacks hit Florida ISP, Australian cardiology group | CSO Online
Unified Interface: Internet Explorer 11 Browser Update Issue – Dynamics 365 Customer Engagement Team Blog
'Car Talk' Lives On In Medical Education, Teaching Med Students How To Diagnose : Shots - Health News : NPR
5 Strategies For Answering Kids' (Super) Tough Questions : NPR
Java mon amour: Kubernetes cheat sheets
Java mon amour: Excellent Kubernetes Developer Certification training on Udemy
Java mon amour: CKA Certification (Kubernetes Administrator)
How to Sharpen Your Interview Skills With These Soft Skills Questions
How to Record and Stream Live TV With Raspberry Pi
HOWTO: Microsoft Certification Exam Preparation Generator – Please Work
Leigh Johnson’s Guide To Machine Vision On Raspberry Pi | Hackaday
Stethoscopes, Electronics, and Artificial Intelligence | Hackaday
Hack My House: Raspberry Pi as a Touchscreen Thermostat | Hackaday
5 tips to help CIOs overcome patching problems
DSHR's Blog: Economic Models Of Long-Term Storage
Weather Station Project Overview
Gartner: CIOs Will Be as Responsible for Culture Change as Chief HR Officers | APMdigest - Application Performance Management
BitSight: Security Ratings Leader - Cyber Risk Management
Home endpoints twice as likely to be infected as businesses
The Surprising Secret to Improving Employee Engagement | Beth's Blog
Ten things you need to know about Pass-through Authentication - The things that are better left unspoken
Thoughts on VPNs for Road Warriors - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
The Strategy Private School Endowments Love the Most | Institutional Investor
VulnReport Install ·
First look on the new Azure Sentinel cloud-native with Azure Notebooks free service #Jupyter #SIEM #SIEMaaS #Azure #Sentinel | Robert Smit MVP Blog
Learning about containers | Nelson's log
Why I write my resume in LaTeX | Logan Marchione
Security Thoughts: Veeam Backup & Replication leaks Azure Password in log - The things that are better left unspoken
Saving regret — and how to avoid it
The Trouble with Troubleshooting | APMdigest - Application Performance Management
Chris's Wiki :: blog/sysadmin/PrometheusSubqueriesMathOverTime
Diving into Merkle Trees
PureBoot, the High Security Boot Process – Purism
Strategies for securing container deployments | ITProPortal
5 Useful Tips for Better Tmux Terminal Sessions
Reducing security risks with centralized logging | Opensource.com
Full API lifecycle management: A primer - Red Hat Developer Blog
An LA hospital will put Alexa in over 100 patients' rooms
France’s New Offensive Cyber Doctrine - Lawfare
Introduction to spatial joins with QGIS | Opensource.com
Twenty years of U.S. government inflation data
Berkshire Hathaway 2018 Annual Letter by Warren Buffett — My Money Blog
Who Shoulders the Burden of Federal Income Taxes?
You MUST patch 12.1.0.1 and 11.2.0.3 and older before June 2019
The Cloud Migration Journey Series – Ather Beg’s Useful Thoughts
SignalsEverywhere Podcast EP1: Es’hail-2, Favorite RTL-SDR Blog Posts and What SDR Should I Get?
A Sense of Urgency: Money Can’t Buy You More Time — My Money Blog
Internet gatekeeper warns of 'ongoing and significant' DNS attacks
Hacking Amazon dash buttons, the hard way, with OpenWRT – Huan Truong's Pensieve
OSSEC Installation Guide for Ubuntu - < 10 min to Raise the Defences
Wireshark Tutorial and Tactical Cheat Sheet | HackerTarget.com
Tcpdump Examples - 22 Tactical Commands | HackerTarget.com
22 SSH Examples, Practical Tips & Tunnels | HackerTarget.com
Ubuntu, DNS, and sudo | Nelson's log
Adding Cover Art to FLAC file from Command Line and GUI - Life of a Geek Admin
How To Mount and Unmount ISO files using PowerShell - Life of a Geek Admin
Nessus, OpenVAS and Nexpose VS Metasploitable
eurobsdcon_silbersack.pdf
Michael James Silbersack
800 Free eBooks for iPad, Kindle & Other Devices | Open Culture
pki - CAC enable JBoss - Stack Overflow
External and Federal PKI Interoperability
TCP timestamps - ForensicsWiki
Mitigating End of Life Technology by Bill Keyworth: BSMReview.com
Useful WMIC Queries Computer Info | g.fisk
Remote Desktop – Black Screen Of Death | g.fisk
Network performance with VMXNET3 on Windows Server 2016 - Life of a Geek Admin
Disable TCP and ICMP Timestamps - Whonix
Patch Tuesday, February 2019 Edition — Krebs on Security
Replacing default certificates with CA signed SSL certificates in vSphere 6.x (2111219)
Configuring CA signed certificates for ESXi 6.0 hosts (2113926)
Replacing ESXi SSL Certificates and Keys
Sleeping at Night: Cybersecurity, Patient Safety and the Radiology Department
Building A Cybersecurity Team in Radiology | Imaging Technology News
Cybersecurity for Medical Imaging Departments – LINK
Cybersecurity Increasingly Critical for Medical Imaging
How to Choose Between Penetration Tests and Vulnerability Scans | EdTech Magazine
Welcome to MWR Labs - Cyber security research and development
CISSP Exam Changes: Tips and tricks to pass the new CAT format - YouTube
(172) MF Prod - YouTube
(172) Free CISSP Study Questions of the Day from IT Dojo - YouTube
(172) Larry Greenblatt - CISSP 2018 Exam Tips - YouTube
DoD Approved 8570 Baseline Certifications
Major Security Breach Found in Hospital and Supermarket Refrigeration Systems
ONTAP 9 Antivirus Configuration Guide - ECMLP2492609
What is EMC's CAVA / Common Event Enabler? - THE SAN GUY
Anti-virus on VNX CIFS Servers » Cyberfella Ltd
Programming Books You Wish You Read Earlier
2019 Update on frameworks, standards, and regulations for infosec - Security Boulevard
Top 30 Information Assurance Analyst Interview Questions and Answers for 2019
Brain-hacking: Why Social Engineering is so effective - Security Boulevard
CIPHER Selected as Top 10 Best Performing MSSP
When it Comes to NIST 800-171 Compliance – There’s ‘On Time’ and There’s ‘Lombardi Time’ - Security Boulevard
Cyberattacks in a Global Supply Chain: How Compliance Officers Can Mitigate Risk - Security Boulevard
The Complete Application Security Checklist | Synopsys
The Route of a Text Message, a Love Story - Motherboard
DFARS Cybersecurity Audits: What to Expect
Lessons learned from the Microsoft SOC—Part 1: Organization - Microsoft Secure
Toyota Australia driven offline by cyber attack, as heart hospital hit by ransomware
HoneyPy - A Low To Medium Interaction Honeypot - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
OSFClone - Open Source Utility To Create And Clone Forensic Disk Images - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
These Are the Countries With the Best and Worst CybersecuritySecurity Affairs
Best practices for handling gaps in cloud security - TechRepublic
Remember, data privacy is always the end goal of any security measure; don't lose sight of this fact: Protecting information is the top priority.
Free Tool: Honey FeedSecurity Affairs
ATT&CKized Splunk - Threat Hunting with MITRE’s ATT&CK using SplunkSecurity Affairs
Windows® Domain Controller and Zero Trust Security | JumpCloud
Benefits of OpenLDAP™ | JumpCloud
How to Turn a Raspberry Pi Into a VPN-Secured Travel Router
The Rise of Ransomware and the Consequences for SMBs
11 Takeaways: Targeted Ryuk Attacks Pummel Businesses
Healthcare Exchange Standards: Segmenting Sensitive Health Topics
Japan Security Analyst Conference 2019 -Part 2- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Iptables Essentials - Common Firewall Rules And Commands - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Powershell – My Setup at Work as a SysAdmin
SEAL Training | Diary of a Network Geek
Hacking Healthcare Live: Bits and Bytes Meet Flesh and Blood ~ Cyber Thoughts
Ryuk Ransomware, Exploring the Technical and Human Connections
Six tips for securing identity in the cloud – Microsoft Azure Government
The cybersecurity legislation agenda: 5 areas to watch | CSO Online
7 cheap or free cyber security training resources | CSO Online
DIY X-Ray Machine Becomes CT Scanner | Hackaday
The Woeful World of Worldwide E-Waste | Hackaday
Exploration of Cooking
Bullet Journaling for Nonprofit Professionals | Beth's Blog
Industrial Security | Tenable®
Dtex Systems - User Behavior Intelligence
DeployHappiness | A Universal Naming Scheme for Your Devices
83 percent of US organizations have accidentally exposed sensitive data
The five most common technologies that have led to accidental data breaches by employees are external email services like Gmail and Yahoo (51 percent), corporate email (46 percent), file sharing services like FTP sites (40 percent), collaboration tools such as Slack and Dropbox (38 percent), and SMS/Messaging Apps like G-Chat and WhatsApp (35 percent).
Wandera | Mobile Security
Jaffar's (Mr RAC) Oracle blog: What's new in 19c - Part III (Data Guard)
Japan scholar and translator Donald Keene dies at 96 - Japan Today
Comprehensive Guide on Snort (Part 1)
I'm resigning from SANS - Black Hills Information Security
Spectre is here to stay An analysis of side-channels and speculative execution
Data lakes, observability, and making devs awesome - SysAdmin1138 Expounds
SEC575_iOS12_AndroidPie_Handout.pdf
How to make Email Bot service in Python | Alexander V. Leonov
The Average Cost of Fighting a Cyberattack Now Exceeds $1.1M | DEVOPSdigest
$1.1M
Automating snapshots with pyznap on Centos 7 | SvennD
Bureaucracy survival skills – Blog FiascoBlog Fiasco
What happened with Citrix Printing throughout 2018?!
smbclient receiving error message: protocol negotiation failed: NT_STATUS_CONNECTION_DISCONNECTED | setaOffice
Vulnerababe UNACEV2.DLL puts software like WinRAR at risk | Born's Tech and Windows World
7-Zip Version 19.00 released | Born's Tech and Windows World
End of General Support for vSphere 6.0 - Davoud Teimouri
30! TIPS on how to use Amazon Web Services (AWS) more efficiently – multiple cost savers included
Version 2.0 of the Cloud Services Cheat Sheet is now live. Get it here!
New Community (book) project – Byte sized Cloud design principles and architectural recommendations
'Yame-hara' - pressuring resigning workers not to quit - Japan Today
Yame-hara
Oracle Multimedia will be removed in Oracle Database 19c
Oracle 18c Express Edition (XE) for Windows is available
Jaffar's (Mr RAC) Oracle blog: What's new in 19c - Part II (Automatic Storage Management - ASM)
Jaffar's (Mr RAC) Oracle blog: Whats new in 19c - Part I (Grid Infrastructure)
DigitalOcean launches its managed database service | TechCrunch
Re-Imagining Virtualization with Kubernetes and KubeVirt - Part II – Red Hat OpenShift Blog
Monte Carlo Simulation with Python - Practical Business Python
How to Automate FFmpeg and Bento4 With Bash Scripts
CPDP2019 Computers, Privacy and Data Protection conference
7 Key Considerations for Kubernetes in Production - The New Stack
Script to create mount points in LVM - Kernel Talks
How to Create Bootable Ubuntu 18.04 USB Stick on Linux | Linuxize
Implementing Dstat with Performance Co-Pilot
Open Science, Open Source and R | Linux Journal
vCenter 6.5 HA Installation and Configuration - vembu
Configuring vCenter HA - Part 1 - vembu
How To Migrate Shares and Files with ease by using Microsoft Storage Migration Service - Part 2 | ESX Virtualization
NVMe-oF Support is now Released! | Cody Hosterman
NVMe-oF
Upgrading a Basic vCenter 6.5 HA Cluster to vCenter HA 6.7 U1 – The Wifi-Cable
Tips for writing Vester test files, part 2 | Adventures in a Virtual World
This vegetable curry has bold flavors to keep everyone happy - Japan Today
Basics – The FARR Model | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
Fault tolerance: This is your baseline protection against individual storage component failure. If a disk (or flash) drive fails, you don’t want to lose your data. While we take fault tolerance for granted as something we can control and see alerts for within an on-premises environment, there’s less visibility and control in public cloud. More so, fault tolerance doesn’t give you protection from anything other than storage unit failure. Availability: “If a tree falls in the forest and no-one hears it, does it really make a noise?” That’s the old philosophical question that availability skirts around: if your data is online and error free, but you can’t access it, is it actually usable? Availability is about making sure you have protection against losing connectivity to the data/workload. For example: if your workload is one presented only back into the business, and the link between the business and the VPC in which it is running is lost, how do you get access to it again? Do you plan for multiple paths for availability, or do you accept a single point of failure on data/workload availability? Redundancy: You’re hosting your service in AWS Sydney, and there’s a fire in the datacentre – what’s your failover strategy? You’ve built a whiz-bang application for your customers that relies on a back-end RDS database, and the region hosting that database starts experiencing RDS services going down. How (and to where) do you failover your database service to allow customers to keep doing what they need to do? Recoverability: Ransomware gets into your VPC and encrypts all the data there. A developer accidentally issues a delete statement on the customer contact table within the production rather than development RDS environment. The CEO accidentally deletes critical O365 email folders. The block storage your service runs on suffers an outage and the cloud provider’s fault tolerance level was insufficient to prevent data corruption. Fault tolerance, availability and redundancy are all about avoiding as much as possible a data loss situation, but recoverability is how you handle the situation when the chips are down. Do you trust to cloud native protection, or use a mix of both? (Increasingly, mix of both is the safest, cheapest and most flexible way to go.)
Easy 1-hour Pro Mini Classroom Datalogger [Build Update: Feb 2019] | Underwater Arduino Data Loggers
Replacing the default (self signed) certificate on a RD Session Host server - Adrian Costea's blog
Automating MDT Windows 10 Image Captures with Packer - WinSysBlog
Replacing Self Signed Remote Desktop Services Certificate on Windows | Knowledge eXchange
How to Modify Default Share Permissions and Other Tweaks • Helge Klein
A little something about Share vs NTFS permissions
Python, Your Friendly OSINT Helper – We are OSINTCurio.us
Tracking All the WiFi Things – We are OSINTCurio.us
Five Things You Can Do To Stay OSINT Curious – We are OSINTCurio.us
Using OSINT for your personal threat model – We are OSINTCurio.us
How to Enable Monitor Mode & Packet Injection on the Raspberry Pi « Null Byte :: WonderHowTo
Tactical Nmap for Beginner Network Reconnaissance « Null Byte :: WonderHowTo
Analyzing the Hacks: The Girl in the Spider's Web Explained « Null Byte :: WonderHowTo
SSD, LVM and you: Zero data loss, LVM caching, and properly configuring your Linux box to get the most out of SSD! | The Doom'd Net
SHA-2 patch for Windows 7 arrives on March 2019 | Born's Tech and Windows World
How to Brute-Force Nearly Any Website Login with Hatch « Null Byte :: WonderHowTo
How to Detect Vulnerabilities in a Web Application with Uniscan « Null Byte :: WonderHowTo
Hubbard on Networking: AutoSSH on Odriod XU4 running Kali Linux 2
Odriod XU4
Hubbard on Networking: Create an HP iLo account when you don't know the Admin Password
Hubbard on Networking: A Simple Python 3 Script for my Favorite nmap Scripts
Hubbard on Networking: Useful Linux commands for troubleshooting WiFi
Hubbard on Networking: Using iPerf3 to Test 2.5Gb/5Gb and 10Gb Links
Hubbard on Networking: Update to testing 10Gb links with iPerf3
Hubbard on Networking: Learning Python 3
Hubbard on Networking: The tools on my Ubuntu 18.04 laptop
Oracle Database Appliance (ODA) Installation, Configuration and Deployment Steps – Talip Hakan Ozturk's ORACLE BLOG
Web and Podcast – We are OSINTCurio.us
opatch lsinventory – Talip Hakan Ozturk's ORACLE BLOG
Top 10 Things to Do After Installing Kali Linux « Null Byte :: WonderHowTo
What’s new in ESXi 6.5 Storage Part I: UNMAP | Cody Hosterman
Hubbard on Networking: Enabling TLS 1.1/1.2 for RDP in Microsoft Server 2008R2/Windows 7 SP1
Setting the Standard for CVE - Lawfare
Cimpanu: The US Govt Accountability Office recommends the US adopt GDPR-like privacy legislation @ AskWoody
AWS Nitro System – Perspectives
Data Breaches: What Do the Numbers Mean?
Windows Firewall Post Exploitation with Netsh
Upgrading / Migrating from vSphere 5.x to 6.x (6.5 , 6.7) best practices & Approach – Siva Sankar Blogs
The Rise of the Corporate Technology Ecosystem (CTE) | Daniel Miessler
DLA_Briefing_Template_as_of_10252017 - C151_CyberSecurity.pdf
Brian Pippert
SSL/TLS: How to choose your cipher suite - AMIS Oracle and Java Blog
https://www.ryanfrantz.com/posts/when-does-an-investigation-end.html
https://www.ryanfrantz.com/posts/architecture-reviews.html
How to read fiction to build a startup | TechCrunch
How to build a WiFi picture frame with a Raspberry Pi | Opensource.com
DCOMrade - Powershell Script For Enumerating Vulnerable DCOM Applications - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
DCOMrade
Lacking Medical Device Security Puts Everyone at Risk - Security Boulevard
Introducing Zombie POODLE and GOLDENDOODLE
Do You Have Security Champions in Your Company? A 6-Step Checklist for a Successful Program
What is Security+ (Plus)? | TechRoots
Federal PKI Security Challenges: Extending IDaaS with Certificate as a Service - Security Boulevard
Beyond Tor: Examining the Uncharted Corners of the Dark Web - Security Boulevard
The Costs of Cyberattacks Are Real | Radware Blog
SSL/TLS Attacks, Part 3: Who’s at Risk from Compromised Digital Certificates? - Security Boulevard
Zero Day Initiative — The February 2019 Security Update Review
Windows Incident Response: Review: Tribe of Hackers
Germany makes its cyber capabilities available for NATO allianceSecurity Affairs
What, No Expense Account? My RSA 2019 Itinerary | Thom Langford
Getting started with Linux Containers on Windows Server 2019 - Ben Thomas' Blog
Update now! Microsoft and Adobe’s February 2019 Patch Tuesday is here – Naked Security
Network Segmentation in the Zero Trust Era | Security Architects Partners
Cyberinsurance and Acts of War - Schneier on Security
The Complicated Economy of Open Source Software
Step 5. Set up mobile device management: top 10 actions to secure your environment - Microsoft Secure
Kaboom - Automatic Pentest - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Inside a GandCrab targeted ransomware attack on a hospital – Naked Security
A comprehensive survey on graph neural networks | the morning paper
Poka Yoke in Manufacturing - The Automation Blog
Notes from OWASP Helsinki chapter meeting 36 – Rule of Tech
The 5 Most Important Typography Terms, Explained
.NET Framework February 2019 Security and Quality Rollup | .NET Blog
HIMSS19: The Cybersecurity Obstacles, Opportunities Ahead
Web Scraping Boilerplate: Everything You Need to Start Your New Python Scraping Project (Batteries Included)
NIST Risk Management Framework Webcast: A Flexible Methodology to Manage Information Security and Privacy Risk | NIST
How to improve your cyber resilience - IT Governance Blog
Tech Refresh as Part of an Effective Vulnerability Management Program: Part Two - Delta Risk
What CEOs Need to Know About the Future of Cybersecurity
Toyota Prepping 'PASTA' for its GitHub Debut
PASTA (Portable Automotive Security Testbed with Adaptability)
Lessons Learned from a Hard-Hitting Security Review
Jaspreet Singh
Securing Clients SAP S4HANA Netweaver ABAP | Onapsis
Getting PowerShell Empire Past Windows Defender - Black Hills Information Security
Microsoft updates its schedule for SHA-2 ‘critical’ Win7 update, now due in March @ AskWoody
ESXi: Slow Disk Performance on HPE Gen8 | Windows OS Hub
AMP RJ-45 vs WE/SS (Regular) RJ-45 Plugs | Matt's Tech Pages
Blockchain and Trust - Schneier on Security
How To Migrate Shares and Files with ease by using Microsoft Storage Migration Service | ESX Virtualization
Top 10 Critical Skills Every vSphere System Administrator Should Know
ipmitool | panticz.de
Load Testing Web Servers with Siege Benchmarking Tool
Three stages of risk-based vulnerability management: Crawl, Walk, Run
OpenJDK projects you should know about - Panama
The Final Version of the EU's Copyright Directive Is the Worst One Yet | Electronic Frontier Foundation
Programming Management & Leadership Books | b3n.org
APM in a Digital World - Part 3 | APMdigest - Application Performance Management
Microsoft Patchday: Other Updates February 12, 2019 | Born's Tech and Windows World
APM in a Digital World - Part 2 | APMdigest - Application Performance Management
APM in a Digital World - Part 1 | APMdigest - Application Performance Management
19c – Laurent Schneider
Jaffar's (Mr RAC) Oracle blog: Oracle 19c and my favorite list
Installing and running Oracle Database 19.2.0.0 on Oracle Linux 7 - DBA - Rodrigo Jorge - Oracle Tips and Guides
It's now 2019, and your Windows DHCP server can be pwned by a packet, IE and Edge by a webpage, and so on • The Register
Performance Tuning Dojo » ADMIN Magazine
Cybersecurity Documentation: The Best Defense Is a Good Offense
The Business of Organised Cybercrime - Security Boulevard
Save and Invest | Investor.gov
Five Convergence Solutions to Help Manufacturing Cross the IT-OT Security Schism
Owning Your Legal Practice's Cybersecurity – MSPs and You
Enhancing cyber threat protection in Microsoft Office 365 - Security Boulevard
Why True End-To-End Encryption is Important for Distributed Apps - Security Boulevard
2019's Hottest, and Most Bankable, Security Certs - Security Boulevard %
Five Major Cloud Security Roadblocks and Their Impact on the Enterprise - Security Boulevard
Introduction to WiFi Security - Security Boulevard
Quickly Gauge Your Serverless Security Readiness With This Short Quiz
The Cyber-Risk Paradox: Benefits of New Technologies Bring Hidden Security Risks - Security Boulevard
Microsoft Patch Tuesday updates for February 2019 fixes IE Zero-DaySecurity Affairs
Cloud, On-Premises, or Hybrid – What Is the Best HSM Solution for You? - Security Boulevard
“It is everyone’s business and responsibility” – 40+ Cybersecurity Professionals Share What They Wish Business Leaders Would Understand in Their Own Words - Security Boulevard
Kubernetes Security Best Practices: From Hosting to Deployment
Health Data Security: The Most Promising Technologies
Ron Mehring
Assessing IoT Risks in Healthcare Environments
Julia Hesse
Solving the TLS 1.0 Problem - Security documentation | Microsoft Docs
Devastating Cyberattack on Email Provider Destroys ...
Microsoft rolls out healthcare-focused chat features and AI assistants | FierceBiotech
HIPAA Enforcement Update: Areas of Focus - HealthcareInfoSecurity
Medical Device Cyber Risk: An Enterprise Problem
CynergisTek
Japan Security Analyst Conference 2019 -Part 1- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
HIMSS19 ~ Cyber Thoughts
Who’s Responsible for Your Cyber-Security?
How to Keep Your Kids Safe on the Internet (10 Actionable Tips)
No left boundary for Vulnerability Detection | Alexander V. Leonov
Use Group Policy To Manage Settings for Store Apps | Alexander's Blog
Unexpected Microphone and Camera Behavior in Windows 10 Settings | Alexander's Blog
Enterprise IT Moving More Workloads to Cloud in 2019 | APMdigest - Application Performance Management
Copying Large Files over an Unreliable Network Using BITS and PowerShell | Windows OS Hub
Integrating Windows Updates into Windows 10 Install Image | Windows OS Hub
Work Optional by Tanja Hester: An honest review
Using Azure Site Recovery for Migrations (Part 2) | PeteNetLive
Using Azure Site Recovery for Migrations | PeteNetLive
Remove unknown VM image from ESXi |
Chris's Wiki :: blog/unix/GrepDevNull
Microsoft analysis: 0-day vulnerabilities the biggest risk | Born's Tech and Windows World
Patchday: Updates for Windows 7/8.1/Server Feb. 12, 2019 | Born's Tech and Windows World
500px reveals 2018 breach that exposed user data
What's the right amount of swap space for a modern Linux system? | Opensource.com
Hacking an Oracle Database and How to Prevent It | Integrigy
oss-sec: CVE-2019-5736: runc container breakout (all versions)
SS7 Cellular Network Flaw Nobody Wants To Fix Now Being Exploited To Drain Bank Accounts | Techdirt
Gain Valuable Kubernetes Skills and Certification with Linux Foundation Training | Linux.com | The source for Linux information
Protecting the Logical Security of a Network Environment - InCyberDefense
Multiple Factors Are Driving Growth at the CNCF
One in six American adults now wear a computer on their wrist
Terence Luk: Using InstallSoftwareRemotely.ps1 to upgrade VMware Horizon View Agent
InstallSoftwareRemotely.ps1
Document: Executive Order on Artificial Intelligence - Lawfare
GDPR: Do your backups spark joy? | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
Veterans can access their medical info through Apple's Health Records
Linked - New Research Reveals 6 Ways Leaders May Be Out of Touch With Their Employees
Lawyers and Cybersecurity in 2019: Trends and Tips - MyCase Blog
What Is Web Scraping? How to Collect Data From Websites
Service Fabric Customer Architecture: ZEISS Group – AzureCAT Guidance
SQL Mysteries: SQL Server Login Timeouts – A Debugging Story – SQL Server According to Bob
Five lessons we learnt about GDPR in 2018 - Security Boulevard
A Cybersecurity and Cloud Innovator – and a Great Partner - Security Boulevard
15 Hacker Types – The Good, the Bad and the Ugly
Ransomware Evolution: GandCrab v5.1 New Exploit Kit Distribution and TOR Site Features - Security Boulevard
Ohio Senate Bill 220 Incentivizes Businesses to Maintain Higher Levels of Cybersecurity - Security Boulevard
The Perfect Sales Kickoff - Security Boulevard
How Panorays is Different Than Other Third-Party Risk Management Solutions - Security Boulevard
Panorays
The 3 Pillars of the Modern-Day SOC - Security Boulevard
Customers Blame Companies not Hackers for Data Breaches - Security Boulevard
Immunizing Your Healthcare Technology Against Cybersecurity Threats - Security Boulevard
Simplifying Cybersecurity Deployments with Automation - Security Boulevard
B 00 Doesnt It make You WannaCry Mitigating Ransomware on a Windows Network David Branscome - YouTube
The Cybersecurity Skills Gap: The Defining Skills Shortage of Our Age - Security Boulevard
Cloud security infographic: The Facts | Intercity Technology
How to Monitor File Changes across Windows Servers - Security Boulevard
Quick Hit: Speeding Up a Slow/Mundane Task with a Little Rcpp | rud.is
EdGuards - Security for Education
SSL Attacks, Part 2: Where Can Cybercriminals Access Digital Certificates? | Venafi
SSL Attacks, Part 1: Why Do Cybercriminals Abuse Digital Certificates? | Venafi
A Revolutionary Approach to HIPAA Compliance - Security Boulevard
HIMSS 2019 – Champions of Security Unite – Professionally Evil Insights
iOS 12.1.4 Patches Three Major Flaws | Avast - Security Boulevard
Whiskey | Daniel Miessler
To Understand IoT Security: Look to the Clouds - Security Boulevard
nDPI - Open Source Deep Packet Inspection Software Toolkit - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Microsoft will make Office Pro Plus GDPR compliant | Born's Tech and Windows World
'Grandmother Hypothesis' May Help Explain Why Women Live Past Menopause : Goats and Soda : NPR
SQL Server Worker Thread Default Calculation – SQL Server According to Bob
7 Critical Job Application Mistakes to Avoid (Especially for New Graduates)
The Best Portable Apps That Require No Installation
Demystifying Stripe Width in vSAN — ThinkCharles.net
Tips for writing Vester test files, part 1 | Adventures in a Virtual World
OpenJDK projects you should know about: Valhalla
SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM.Security Affairs
Reverse RDP Attack - Rogue RDP Server can be used to hack RDP clientsSecurity Affairs
Data breaches, GDPR lead 54% of companies to increase IT security spending - TechRepublic
Business continuity in ISMS? - Security Art Work
InfoSec Handlers Diary Blog - Struts Vulnerability CVE-2017-5638 on VMware vCenter - the Gift that Keeps on Giving
InfoSec Handlers Diary Blog - UAC is not all that bad really
Spy Versus Spy: How a Researcher And a Journalist Unmasked an Undercover Agent - Motherboard
Michael on Security: March Updates on Frameworks & Standards
Ransomware Victims Who Pay Cough Up $6,733 (on Average)
Health Data Breach Tally: What’s New? - HealthcareInfoSecurity
Susan Lucci
Settlement Reached in Community Health Systems Breach Suit
HIMSS19: Cybersecurity in the Spotlight - HealthcareInfoSecurity
EHR Vendor Greenway Gets Hefty Fine for False Claims
Bolstering the Cybersecurity of Medical Devices
Chaitanya Srinivasamurthy
Cottage Health Hit With $3 Million HIPAA Settlement
Securities Fraud Claims Get Boost From EU Data Privacy Rules
Let’s talk about IoT device security | NIST
Wyoming Seeks to Repeal Hospital Privacy Regulation for HIPAA Clarity
Fnord - Pattern Extractor For Obfuscated Code - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Bincat - Binary Code Static Analyser, With IDA Integration - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Small and Medium Business Security Strategies: Part 5 - Black Hills Information Security
Small and Medium Business Security Strategies: Part 4 - Black Hills Information Security
Small and Medium Business Security Strategies: Part 3 - Black Hills Information Security
Small and Medium Business Security Strategies: Part 2 - Black Hills Information Security
Small and Medium Business Security Strategies: Part 1 - Black Hills Information Security
Investigate Suspicious Account Behaviour Using SysmonSearch - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Introducing WMIOps - Christopher Truncer's Website
Make the Time to Fix Your Time Debt | Hackaday
DSHR's Blog: Cloud For Preservation
[career] Navigating Your Career | Don Jones®
Digital Transformation Efforts Hindered by Lack of Collaboration Between IT and Business | APMdigest - Application Performance Management
Essential System Tools: f3 - detect and fix counterfeit flash storage - LinuxLinks
Docker - Basics just for me | itsec.siers.ch
Reusing DHCP config in ISC dhcpd | Lesser-Evil
Kubernetes - Namespaces - The IT Hollow
Firing people is always a last resort. | The IT Skeptic
AD Controls [SHIFT]
Upgrade a Standalone ESXi Host to ESXi 6.7
Taking the Azure Data Box Gateway (preview) out for a spin! – Karim Vaes
30 Things to Get You Started - Black Hills Information Security
EyeWitness and Why It Rocks - Black Hills Information Security
DFIRTrack - The Incident Response Tracking Application - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
GitHub - FortyNorthSecurity/EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
Goscan - Interactive Network Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
RedELK - Easy Deployable Tool For Red Teams Used For Tracking And Alarming About Blue Team Activities As Well As Better Usability In Long Term Operations - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CANalyzat0r - Security Analysis Toolkit For Proprietary Car Protocols - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Volatility Workbench - A GUI For Volatility Memory Forensics - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Everything you need to know about DPOs under the GDPR - IT Governance Blog
Bypass Application Whitelisting using Weak Path Rule
The IT Governance Cyber Resilience Framework: how it works - IT Governance Blog
Transform your security posture with cyber resilience - IT Governance Blog
Google Online Security Blog: Open sourcing ClusterFuzz
New Zombie 'POODLE' Attack Bred From TLS Flaw
Mitigation upgrade to TLS v1.3
Australian Parliament Reports Cyberattack on Its Computer Network - The New York Times
Ransomware Attack Via MSP Locks Customers Out of ...
Cyber risk management: The disconnect between business, security teams | CSO Online
David A. Wheeler's Blog
Certifications Are About Support | The Networking Nerd
Cisco - Linux - Python: MainPage
Design for security [LWN.net]
Dstat - A Resourceful Tool to Monitor Linux Server Performance in Real-Time
Ansible and FreeIPA Part 2 | Adam Young’s Web Log
Ansible and FreeIPA Part-1 | Adam Young’s Web Log
Containers: The Basics - Linux Academy Blog
ZFS Boot Environments Are Helping To Improve The Resilience Of FreeBSD Upgrades - Phoronix
Remote Desktop Protocol Riddled With 16 Major Vulnerabilities
Microsoft and Open Source RDP Clients Are Vulnerable to System Takeover Attacks - WinBuzzer
Top Hex Editors for Linux
Disk Encryption for Low-End Hardware | Linux Journal
A Moment of Truth for Cyber Insurance - Lawfare
The Funniest Incident Postmortem | Gluster
A review of all the calendar options in SharePoint and Office 365 - SharePoint Maven
Successful Founders Share Their Advice for Starting Your Own Business
Asylo
7 Tips For Communicating With the Board
Report: Over 59,000 GDPR data breach notifications, but only 91 fines | CSO Online
Open Source LIDAR Lets You Get Down To The Nitty Gritty | Hackaday
NetLogo for scientific research: Modeling | Opensource.com
Ubiquiti Discovery Service Exposures Allowing DoS Attacks Explained
Enterprises Move (Slowly) Toward Stronger Cybersecurity, Research Shows
Your Money or Your Life - An Interview with Author Vicki Robin | Mad Fientist
Multiple Ways to Exploiting Windows PC using PowerShell Empire
New Vulnerabilities Make RDP Risks Far From Remote
Over 59K Data Breaches Reported in EU Under GDPR
How to Access the Dark Web Safely and Anonymously
Information Security | Daniel Miessler
Ransomware Evolution: GandCrab v5.1 New Exploit Kit Distribution and TOR Site Features
GandCrab v5.1
How ADP identifies and reduces third-party risk | CSO Online
Hard days at work - SysAdmin1138 Expounds
Julia Reda – Article 13 is back on – and it got worse, not better
Self-charging pacemakers are powered by patients' heartbeats
‘Achieving and Maintaining Cyberspace Superiority’: A Cyber Command and Interagency Legal Conference - Lawfare
Password Reuse Remains a Barrier to Safer Internet Use, Google Reports
5 reasons why you need to embrace Microsoft Flow - SharePoint Maven
Costs for Windows 7 Extended Security Updates till 2023 | Born's Tech and Windows World
Windows 10: Microcode Updates February 2019 | Born's Tech and Windows World
Planning for the future isn't what it used to be | Opensource.com
UNIX: Building The Most Important OS in the World
The Mayo Clinic created an online tool for predicting kidney stones
Developing an Objective, Repeatable Scoring System for a Vulnerability Equities Process - Lawfare
Big-O Notation Explained | Daniel Miessler
Michael on Security: Security Maturity Models (Part 1 of 2)
Avoid these Common Security Misconfigurations - Security Boulevard
Building a Disk Tower, for all pain and no profit
BestDuplicator
Let's Play with Routing - Part 1
A New Switch for a New Day
Fwknop - Single Packet Authorization & Port Knocking - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
The Mega-Guide to Trends in 2019 – J.D. Meier's Blog
Parsing Text with PowerShell (3/3) | PowerShell Team Blog
oVirt: Open Source Virtualization for the datacenter – Marksei
What Is a VPN Connection and How Does It Work?
Now That’s What I Call Crypto: 10 Years of The Best of Bitcoin | Hackaday
Organize tool box drawers cheap - The Silicon Underground
How bad is MS08-067? - The Silicon Underground
MS08-067
Linux Fu: Easier File Watching | Hackaday
Hack Your File Hierarchy with Johnny Decimal System (Dewey’s Older Brother) | Hackaday
The elements of cybersecurity hygiene and secure networks - Part 3
CISOs must change their outlook or lose their jobs
“AaronLocker” moved to GitHub – Aaron Margosis' Non-Admin, App-Compat and Sysinternals WebLog
The case for building expertise to work on US AI policy, and how to do it - 80,000 Hours
Out-of-Office Messages are a Security Risk - The Lone Sysadmin
Monitoring Citrix - a vendor overview -
Configure SCCM Maintenance Windows based on Patch Tuesday
Automating my TV – Scott Gruby's Blog
Adding Energy Monitoring to Home Assistant – Scott Gruby's Blog
Hyper-V VM configuration version supported features - Thomas Maurer
Cool feature in SMS Trace (Trace32.exe) | 9to5IT
Thoughts on Azure, OMS & SCOM: Digging through log files? SMS Trace is the way to go!
WSUS Windows Update Error 0x80244010: Exceeded max server round trips | Windows OS Hub
0x80244010
Ubuntu 18.10 install notes | Nelson's log
Running Systems » Blog Archive » HA ZFS NFS Storage
Zero Day Initiative — Of ISOs and Attorneys: Legal Action in Vulnerability Disclosure
Windows Incident Response: RegRipper
Building a Cybersecurity Talent Pipeline One Coding Challenge at a Time | Webroot
Compliance Beyond IRS 1075 and CJIS Audits - Blog | Tenable®
IRS1075 CJIS
Cyber (GRU) (II): historical SIGINT - Security Art Work
Great reference list.
Aztarna - the open-source scanning tool for vulnerable robotsSecurity Affairs
Aztarna
Reading the ENISA Threat Landscape Report 2018Security Affairs
Can Enterprises execute a GRC Movement?Security Affairs
Step 4. Set conditional access policies: top 10 actions to secure your environment - Microsoft Secure
Debbie Seres
CISO series: Talking cybersecurity with the board of directors - Microsoft Secure
ADAPT - Tool That Performs Automated Penetration Testing For WebApps - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CIRTKit - Tools For The Computer Incident Response Team - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CIRTKit
Uncle Spufus - A Tool That Automates Mac Address Spoofing - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Pown Recon - A Powerful Target Reconnaissance Framework Powered By Graph Theory - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
LOLBAS - Living Off The Land Binaries And Scripts (LOLBins And LOLScripts) - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
LOLBAS
List of data breaches and cyber attacks in January 2019 - 1,769,185,063 records leaked - IT Governance Blog
A 6-step guide to surviving data breaches - IT Governance Blog
Infosecurity.US - Web Log - OWASP Top Ten IoT 2018
OWASP: What Are the Top 10 Threats and Why Does It Matter?
Privacy: Several States Consider New Laws - HealthcareInfoSecurity
Inside Matrix and Emotet: How They Work, and How to Defend
New Medical Device Cybersecurity Framework Unveiled
Kevin McDonald
Government Spending on Cybersecurity: An Analysis
Alia Mendonsa
A CISO on the Value of Endpoint Detection and Response
Larry Whiteside
Jenkins Pentest Lab Setup
xDedic - Marketplace for Hacked RDP Credentials is Taken Down
Vulnerability Life Cycle and Vulnerability Disclosures | Alexander V. Leonov
What’s wrong with the Raspberry Pi – Own your bits
Installing and setting-up JAVA & JBoss 7 Final on CentOS 6 | RoseHosting
Hardening your HTTP response headers
How to Mitigate the Java Deserialization Vulnerability in JBoss Application Servers | Synopsys
The Bash Fingertips: Making Your Own 'Information Centre' | Tux Machines
Java servers like Jetty, GlassFish and Tomcat | NGINX
Using ngnix with WildFly - JBoss
5 Best Python Frameworks for WebView Testing | Codementor
Build a network emulator using Libvirt | Open-Source Routing and Network Simulation
How to Enable Android Enterprise and configure Personal devices with a Work Profile in Microsoft Intune – The ultimate Step-By-Step Guide
How to Use Docker Containers - Make Tech Easier
Cornelius' Blog: Governance on demand
FOSS Project Spotlight: Mender.io, an Open-Source Over-the-Air Software Update Manager for IoT Devices | Linux Journal
SSL and Weblogic - Remote PSAdmin
Product Lifecycle Management in the Medical Device Industry - White Paper - lifecycle-mgmt-medical-device-bwp-070013.pdf
UD_Cybersecurity-Healthcare-2018-conference-agenda.pdf
Open redirects - the vulnerability class no one but attackers cares about - Steve Tabernacle
Advisories | CERT NZ
GitHub - Vulnerator/Vulnerator: The official distribution of the vulnerability parsing utility.
Let’s Encrypt when your server is behind a firewall and you can’t use DNS Challenge – Diary of an Emacs tragic
Should There Be More School Policies on Teachers' Social Media Interaction With Students? - Law and Daily Life
Looking Ahead To 2019 | The Frog Pond of Technology
How long will Oracle Database 12.2 be supported?
Dissecting 190115 BP, PSU, RU and RUR - DBA - Rodrigo Jorge - Oracle Tips and Guides
Azure Automation of A-to-Z, Part I – DBAKevlar
A Collection of Useful Resources for Web Designers and Programmers
Data Privacy Year | Linux Journal
Using EFI/UEFI firmware in a VMware Virtual Mac... |VMware Communities
Dump LAPS passwords with ldapsearch ·
Searching LDAP using Nmap’s ldap-search.nse script | Faded Lab
CA Spectrum Common Access Card Authentication Solution Guide - Spectrum_CAC_Authentication_Guide_ENU.pdf
DoD CAC Reader | Ubuntu, Derivatives and Linux Mint – CubicleNate's Techpad
Local Admin Access and Group Policy Don’t Mix - TrustedSec
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil …
Centrify Now Offers Free US Government PIV and Military CAC Support for the Mac | Secure Thinking by Centrify
CAC Card for DOD/Military : Fedora
The Risky Business of Cybersecurity
Connectivity Problems Caused by Issues in SQL Server – SQL Meditation
Up, up and to the Clouds: Cloud Computing 101 - Security Boulevard
Parsing Text with PowerShell (2/3) | PowerShell Team Blog
Parsing Text with PowerShell (1/3) | PowerShell Team Blog
Migrate a VM from vCenter to Azure | PeteNetLive
Programming paradigms for dummies: what every programmer should know | the morning paper
Top 30 Data Recovery Interview Questions and Answers for 2019
Demystifying the Indian Data Protection Bill, 2018: Part 2 of 3 - Gemalto blog
Demystifying the India Data Protection Bill, 2018: Part 1 of 3 - Gemalto blog
New Phobos Ransomware Using Same Ransom Note as Dharma - Security Boulevard
What Are Common Certificate Validation Flaws? - Security Boulevard
CVSS: Characterizing and Scoring Vulnerabilities - Security Boulevard
Benefits of SSH Key Management - Security Boulevard
Open Source Licenses Explained - Security Boulevard
The Evolution of Darknets - Security Boulevard
Healthcare: A Cloud Security Investigation (CSI) - Security Boulevard
CISO Intro by Jeremiah Grossman - Security Boulevard
“Cyber Smart” Interview with Bart McDonough - Security Boulevard
Continuous Monitoring 101
How To Install and Use RetroArch on Linux - LinuxConfig.org
Roles and Responsibilities of the Information Security Manager - Security Boulevard
Windows Registry & Osquery: The Easy Way to Ensure Users are Secured - Security Boulevard
Serverless And The Evolution In Cloud Security, How FaaS Differs From IaaS - Security Boulevard
SAP Security Notes 2018: Lessons Learned and a Look to What's Ahead in 2019 - Security Boulevard
FTW - Framework For Testing WAFs - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Build Cheat Sheets and Share Your Favourites! - Cheatography.com: Cheat Sheets For Every Occasion
10 YouTube URL Tricks You Should Know About
Howto: Docker, Databases, and Dashboards to Deal with Your Data | Hackaday
Container Jungle: where do I start? Docker, Kubernetes – Marksei
Ansible, ARA and MariaDB (or MySQL) – The ongoing struggle
Illinois biometric privacy law passes a key court test
VIRTIO 1.1 Standard Moving Closer To Release With GPU Device, Better Performance - Phoronix
DeployHappiness | Master of Science in IT: 1 Year, $5200
Benchmarking The Current Spectre + Meltdown Performance Overhead For 10 GbE Networking - Phoronix
Consumer threats down as cybercriminals target business
Poor integration costs businesses $500,000 a year
Chris's Wiki :: blog/linux/ServerRebootOnPanics
Getting Started with Kubernetes - The IT Hollow
Office 365 down (January 24, 2019)? | Born's Tech and Windows World
Planner Notifications for Teams – All About I.T.
Digital IDs said to boost economies, but privacy is at risk - Japan Today
Prudent Security Admin: Has a New Data Breach Precedent Been Created? - Security Boulevard
How to Become a Chief Information Security Officer — CyberSpeak Podcast - Security Boulevard
Study: Hospitals dramatically increase ad spend following data breaches - Security Boulevard
5 Ways a CISO Can Tackle the CyberSecurity Skills Shortage Now - Security Boulevard
1. Lower the Skill Level 2. Spread the Load For Your Security Professionals 3. Raise Awareness About Cyber Attacks 4. Increase Network Visibility 5. Plan for Tomorrow
NBlog - the NoticeBored blog: NBlog Jan 23 - infosec policies rarer than breaches
NBlog - the NoticeBored blog: NBlog Jan 25 - cyber risks in context
State agency exposes 3TB of data, including FBI info and remote logins – Naked Security
2 distinct campaigns delivered GandCrab ransomware and Ursnif TrojanSecurity Affairs
Collection #1 Data Breach Analysis – Part 2 - by Marco RamilliSecurity Affairs
“Collection #I” Data Breach Analysis – Part 1 – Marco Ramilli Web Corner
Jok3R - Network And Web Pentest Framework - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Voice of the Customer: Azure AD helps lululemon enable productivity and security all at once for its employees - Microsoft Secure
Conpot - An Open Industrial Control Honeypot - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Beebug - A Tool For Checking Exploitability - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Fighting Emotet: lessons from the front line – Naked Security
The Application Security Team's Framework For Upgrading Legacy Applications
Sh00T - A Testing Environment for Manual Security Testers - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
What is an ISMS and 8 reasons why you should implement one - IT Governance Blog
The PCI SSC’s new software security standards – what you need to know - IT Governance Blog
PCI SSC
On the 'structural shortcomings' of the GDPR
Study: Companies with GDPR investments conduct business faster
Girl Scouts announce new cybersecurity patch
5 Malware Trends: Emotet Is Hot, Cryptominers Decline
Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics - The Ethical Hacker Network
Government Shutdown: Impact on Health Data Security, Privacy
Colorado police encrypt *all* their radio communications, frustrating journalists
Life Under GDPR: Data Breach Cost Unknown - HealthcareInfoSecurity
Dharma Gang Pushes Phobos Crypto-Locking Ransomware
Coveware's 2018 Q4 Ransomware Marketplace Report
Google Hit With $57 Million GDPR Fine in France
National Data Privacy Day Is Wishful Thinking
Center for Internet Security releases Microsoft 365 benchmarks | CSO Online
Looping sssd_nss - Blog dbi services
VMware Snapshots: Securing Windows RDP Connections with a Signed SSL Certificate
Landscaping a Secure/Closed Loop Infrastructure in Azure with Terraform & Azure Devops – Karim Vaes
New – TLS Termination for Network Load Balancers | AWS News Blog
Home - Freeplane - free mind mapping and knowledge management software
Top 11 Free Linux DICOM Viewers for Doctors
Understanding Bash fork() Bomb :(){ :|:& };: code - nixCraft
GandCrab ransomware and Ursnif virus spreading via MS Word macros
GandCrab
Debian GNU/Linux 9.7 "Stretch" Released with Patched APT Package Manager
Gulp - A Toolkit for Automating Painful Tasks in Development
Top 5 Vulnerability Scanning Tools – Linux Hint
Best 10 Free and Open Source Lab Management Systems
Get started with LogicalDOC, an open source document management system | Opensource.com
Beware! This Malicious Ransomware Hides As Free Games & Software
Forget No-Carb. Embrace Slow Carb : The Salt : NPR
Buddha Bowl - Make Your Own Bowl for any Phase - Chef Dawn Ludwig
KookBook 0.2.0 available – now manage your cooking recipes better – Blog :: Sune Vuorela
To upgrade or not to upgrade? That's the question! | The ORACLE-BASE Blog
Vulnerabilities Found in Highly Popular Firmware for WiFi Chips
New Android Malware Uses Motion Sensors To Stay Hidden
The 7 Habits of Highly Effective IT Leaders – J.D. Meier's Blog
Corporate Best Practices in Security Awareness and Training Programs
Dan Lohrmann
The Start of the RHCA Journey | Lisenet.com :: Linux | Security | Networking
Guinness World Records bets on Office 365 and AWS to boost business expansion
“It is the IT department’s job to make sure we can respond to the ever-growing changes within our business model, so we can take up new opportunities and move into new markets,” says Rob Howe, IT director at Guinness World Records.
How to inject custom drivers into an ESXi 4.1 image using vibddi?
An AnandTech Exclusive: The Jim Keller Interview
SC Cyber
8 Awesome InfoSec and Cybersecurity Blogs of 2018 -
GitHub - paralax/awesome-cybersecurity-internships: a list of cybersecurity internships
GitHub - jivoi/awesome-ml-for-cybersecurity: Machine Learning for Cyber Security
Greek Gluten Free Meatloaf Muffins | Healthy & Easy Freezer Meals
nVisium
xsstrike.tk
GitHub - s0md3v/XSStrike: Most advanced XSS detection suite.
GitHub - l0ss/Grouper: A PowerShell script for helping to find vulnerable settings in AD Group Policy.
GitHub - minimaxir/big-list-of-naughty-strings: The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Introducing Metta: Uber’s Open Source Tool for Adversarial Simulation
Xeneta | Ocean Freight Rate Benchmarking Platform
The State of AI for Sales Enablement, and the Evolution of the CRM | Emerj - Artificial Intelligence Research and Insight
How To - Use VMware vSphere PowerCLI to patch hosts | 9to5IT
How to Install latest ESXi VMware Patch - [Guide] | ESX Virtualization
How to Write a Business Case ― 4 Steps to a Perfect Business Case Template | Workfront
Security-related Rules
New cybersecurity guidelines for medical devices | Vantage Asia
How to Justify a Software Purchase — Step by Step
SupplyChainBrain - The world's most comprehensive supply chain management information resource.
Troubleshooting remote syslog reachability · Papertrail log management
GitHub - trimstray/test-your-sysadmin-skills: A collection of *nix Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.
Solaris : How to start syslogd in debug mode – The Geek Diary
Topic: Cybersecurity - ABA Journal
How To Centralize Logs with Rsyslog, Logstash, and Elasticsearch on Ubuntu 14.04 | DigitalOcean
Centralised logging with Rsyslog and Microsoft Azure - Part 1
x265 transcoding | Nelson's log
So You Automated Your Coworkers Out of a Job
OSINT Resources for 2019 – Steve Micallef – Medium
A Review of my Bug Hunting Journey - My Learning Journey
HOWTO: Build a Temperature Alert System using a Raspberry Pi – Please Work
What version of SQL Server do I have? | Mohammed Wasay
List Domain Admins & Enterprise Admins in a domain | Mohammed Wasay
Get the list of domain admins and check if they are enabled. Get-ADGroupMember -Identity "Domain Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled 1 Get-ADGroupMember -Identity "Domain Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled Get the list of enterprise admins and check if they are enabled. Get-ADGroupMember -Identity "Enterprise Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled 1 Get-ADGroupMember -Identity "Enterprise Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
Create incremental OVA images using Packer
Peter Gutmann's Home Page
Peter Gutmann
Blue Team Architecture and Analysis - Part 3, Coverage Assessment Map by J Geno - tool, knowledge, procedures
Blue Team Architecture and Analysis - Part 2, Guide to the Part 1 Document by J Geno - engineering, management, data breaches
Blue Team Architecture and Analysis - Part 1 by J Geno - time, business, goals
PowerPoint Creating Conference Posters.pdf - Course_Book_Ppt_TIUD_Conference_Posters10.pdf
All of Windows Cipher Suites | Mohammed Wasay
Windows (10 & 2016) Build 1709 & 1803 cannot connect to SMB Shares | Mohammed Wasay
Oracle to charge for Java Updates & how you can disable them | Mohammed Wasay
Convert a Dynamic IP to Static | Mohammed Wasay
Expedition ML4SEC Part - 1: Introduction to machine learning for security professionals - payatu
Presentations: Billboard science : Naturejobs
Turning your BMC into a revolving door - zeronights_2018_turning_your_bmc_into_a_revolving_door.pdf
IoT Security – Part 4 (Bluetooth Low Energy - 101) - payatu
IoT Security – Part 3 (101 - IoT Top Ten Vulnerabilities) - payatu
Blog Archives - Page 3 of 4 - payatu
IoT Security – Part 2 (101 - IoT Attack surface) - payatu
IoT Security – Part 1 (101 - IoT Introduction and Architecture) - payatu
RedTeaming from Zero to One - Part 2 - payatu
RedTeaming from Zero to One - Part 1 - payatu
Don’t Become a Ransomware Target
Using Packer to Automate vSphere Template Builds
Exploiting JNDI Injections in Java | Veracode blog
vCloudNotes : Information Sharing: How to capture memory dump of a VM from snapshot or suspended state file
Trusted Ransomware Removal And Data Recovery Experts
Security Checklist
North Korean hackers infiltrate Chile's ATM network after Skype job interview | ZDNet
vCloudNotes : Information Sharing: Intel / AMD processor vulnerability: Meltdown-Spectre and VMware Esxi
vCloudNotes : Information Sharing: How to reset iLO login password from within ESXi Shell
Installing the Home Lab – Installing vCenter 5.5 on Windows 2012R2 – Everything-Virtual
vCloudNotes : Information Sharing: How to Check, Start, Stop or Restart Windows version of vCenter 6.x Services
HxD - Freeware Hex Editor and Disk Editor | mh-nexus
Check with Powershell for Meltdown and Spectre #exploit critical vulnerabilities Protection #Meltdown #Spectre #KB4056892 | Robert Smit MVP Blog
DevopsWiki/README.md at master · Leo-G/DevopsWiki · GitHub
GitHub - ANSSI-FR/audit-radius: A RADIUS authentication server audit tool
How to choose the correct Garbage Collector? Java Generational Heap and Garbage Collection explained - Karunsubramanian.com
What you didn't know about java.lang.OutOfMemory Error! - Karunsubramanian.com
Why is there a discrepancy between Windows Task manager Memory and Java Heap ? - Karunsubramanian.com
Building vSphere Templates From Scratch Using Packer and the vSphere API – Green Reed Technology
Windows 10 and reserved storage | Storage at Microsoft
History · bibanon/bibanon Wiki · GitHub
A huge list of Windows log file Event IDs for detecting lateral movement by S. Delano - development, python, script
Detecting Lateral Movement through Tracking Event Logs
Raspberrypi as poor man's hardware hacking tool - payatu
Linux Security Hardening with OpenSCAP and Ansible – clasohm.com
Splunk vs ELK - Karunsubramanian.com
What is Docker? An absolute beginner's guide - Karunsubramanian.com
Unable to Connect RDP: CredSSP Encryption Oracle Remediation | Windows OS Hub
What is SYN_SENT socket status? - Karunsubramanian.com
Windows XP Can’t RDP to Windows 10 / Server 2012R2/2016 RDS | Windows OS Hub
Get Reverse-shell via Windows one-liner
“Collection #1” Data Breach Analysis – Part 1 - Security AffairsSecurity Affairs
How running websites has changed in the last two decades (for an Ars IT guru) | Ars Technica
Fecebook Could Be Slapped With 'Record-Setting' Fine By FTC
7 Common Email Security Protocols Explained
Facebook violated tough new cybersecurity law, says Vietnam – Naked Security
DevOps and Culture, part 2 – Premier Developer
DevOps and Culture, part 1 – Premier Developer
UPnP, Vulnerability As A Feature That Just Won’t Die | Hackaday
Serious Security: What 2000 years of cryptography can teach us – Naked Security
Serverless computing: one step forward, two steps back | the morning paper
The AI cybersecurity impact for IoT - Microsoft Secure
Nine 2019 Cybersecurity PredictionsSecurity Affairs
6 Reasons We Need to Boost Cybersecurity Focus in 2019Security Affairs
​4 ways to prepare for GDPR and similar privacy regulations - TechRepublic
Chris's Wiki :: blog/linux/ZFSLicenseTwoViews
Chris's Wiki :: blog/linux/CPUNumbersNotContiguous
NFS. Not… Dead… Yet… - krypted.com
Julia Reda – Designing the future of cybersecurity in Europe
The challenges of adopting a consistent cybersecurity framework in the insurance industry - Microsoft Secure
Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges - Microsoft Secure
RHEL 6 server receiving error mounting CIFS (Windows) share – mount error(112): Host is down | setaOffice
Running Home Assistant in a Docker container with a Z-Wave USB stick · major.io
All In with Home Assistant – Scott Gruby's Blog
2019 Cloud Predictions - Part 3 | APMdigest - Application Performance Management
2019 Cloud Predictions - Part 2 | APMdigest - Application Performance Management
2019 Cloud Predictions - Part 1 | APMdigest - Application Performance Management
Virtual Machines do not boot after moving from Windows Server 2012 R2 to Windows Server 2019 - American Boffin
Security in Windows Server 2019 - Security Art Work
Data Security is a Global Economic Imperative - Blog | Tenable®
Sitadel - Web Application Security Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Snyk - CLI And Build-Time Tool To Find & Fix Known Vulnerabilities In Open-Source Dependencies - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Snyk
Shed - .NET Runtime Inspector - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Faraday v3.5 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
dnSpy - .NET Debugger And Assembly Editor - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Estimating SOC BudgetRafeeq Rehman – Personal Blog
Robert Penz Blog » Howto install Bitwarden in a LXC container (e.g. Proxmox)
The Evil-Twin Framework: A tool for improving WiFi security | Opensource.com
Behind the Scenes & Under the Carpet – The CenturyLink Network that Powered AWS re:Invent 2018 | AWS News Blog
Learn Windows PowerShell in a Month of Lunches, Third Edition #BookReview #Powershell #PowerCLI #Scripting #vExpert -
Terence Luk: Citrix NetScaler CLI command cheat sheet
Emotet Malware Returns to Work After Holiday Break
Triton/Trisis Attack Was More Widespread Than ...
'We Want IoT Security Regulation,' Say 95% of IT ...
The Rx for HIPAA Compliance in the Cloud
PCI Secure Software Standard v1.0 - PCI-Secure-Software-Standard-v1_0.pdf
PCI Secure Software Standard v1.0 - PCI-Secure-Software-Standard-v1_0.pdf
2018's Most Common Vulnerabilities Include Issues ...
EU copyright laws face uncertain fate after 11 countries reject proposal
Oracle 19c Released : How does that make you feel? | The ORACLE-BASE Blog
GDPR Compliance and the Oracle E-Business Suite Revisited | Integrigy
Winds of change? Winds of mediocrity.
Vulnerabilities in building access system used by schools, governments | CSO Online
Summary: The Dichotomy of Leadership | Daniel Miessler
Kubernetes: List of ports Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
iPhone 11 Plus Wi-Fi 6 Equals Undefined? | The Networking Nerd
iTWire - Cyber security threats will keep getting worse in 2019: claim
Home Automation I | Zamir's Board
CNC milling with open source software | Opensource.com
Kubernetes security: 4 tips to manage risks | The Enterprisers Project
Kali Linux 2018 for testing and maintaining Windows security - Wolf Halton and Bo Weaver [Interview] | Packt Hub
How to Setup DRBD to Replicate Storage on Two CentOS 7 Servers
Oracle Patches 284 Vulnerabilities in January Critical Patch Update
AdoptOpenJDK - Open source, prebuilt OpenJDK binaries
Thank You, John C. Bogle — My Money Blog
Collection 1 data breach covers more than 772 million email addresses
Cloud Computing TECHREPORT - 2018 ABA Survey Results | DennisKennedy.Blog
Introduction to Ubuntu's LXD Containers - Make Tech Easier
Chart: Stock Market Declines Are More Common Than You Think — My Money Blog
Ryuk ransomware banks $3.7 million in five months
Is GDPR Compliance Tougher Than HIPAA Compliance?
Lessons From Report on Massive Singapore Healthcare Hack
Government Shutdown: Experts Fear Deep Cybersecurity Impact
Tom Kellermann
Patch Tuesday, January 2019 Edition — Krebs on Security
Ransomware Attacks: The Data Integrity Issues
The 2019 Health Data Privacy Regulatory Outlook
Cyber resilience and the GDPR - IT Governance Blog
ITIL 4: What you need to know about the 2019 ITIL update - IT Governance Blog
2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2) 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2)
SMB Penetration Testing (Port 445)
Windows Applocker Policy - A Beginner’s Guide
How To Change E1000 into VMXNET3 without changing a MAC address | ESX Virtualization
From Encrypting the Web to Encrypting the Net: A Technical Deep Dive on Using Certbot to Secure your Mailserver | Electronic Frontier Foundation
OpenMediaVault – Good Times With mdadm | PenguinPunk.net
January 2019 patchday issues | Born's Tech and Windows World
Humana Breaches Reflect Chronic Credential Theft in ...
Who Takes Responsibility for Cyberattacks in the Cloud?
What’s wrong with patch-based Vulnerability Management checks? | Alexander V. Leonov
Blowing the Dust off of an IBM AS/400 Server | Hackaday
Resolving Microsoft SQL Server Error 4064 with PowerShell – Mike F Robbins
The Biggest Storage Trends of 2019 | Architecting IT
What Makes IoT A Security Risk? | The Networking Nerd
Configuring TACACS+ Server on Ubuntu 14.04LTS – Keeran's Blog
CLOS Topology
Firewall Ruleset Automation with CI Pipeline « ipSpace.net blog
How to configure Windows 10 in Kiosk Single App, full-screen mode
Just one more esxi-guy: The D.C.L.I. (Datacenter CLI)
Stanford uploads 111 lectures by Donald Knuth. – Virtually Fun
Taking a look at AutoDeploy in vSphere 6.5
Tiger - The Unix Security Audit and Intrusion Detection Tool
Tiger - The UNIX Security audit and intrusion detection tool
How to Set Up a Local DNS Resolver on Ubuntu 18.04, 16.04 with BIND9 - LinuxBabe
Am I financially independent? (And does it matter?)
CVE Vulnerabilities: All You Ever Wanted to Know About
Top Ways to Get ROI From Your AppSec Program - Security Boulevard
Kubernetes: Master Post Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
Top 5 things SMBs should consider when evaluating a cybersecurity strategy | Webroot
All About the Hotspot Honeypots - Security Boulevard
How to data breaches happen - Security Boulevard
Sometimes A Vulnerability Isn’t So Vulnerable
pfSense VLANs on Proxmox - Linux Included
SSHGuard settings on pfSense - Linux Included
Healthcare Continues to Be Prime Target for Cyber Attacks
SlackPirate - The Slack Enumeration and Extraction Tool - emtunc's Blog
Using Ansible to bring up a three node Patroni cluster in minutes - Blog dbi services
GitHub - danluu/post-mortems: A collection of postmortems. Sorry for the delay in merging PRs!
Reading postmortems
Verizon FiOS – ICMP Traceroute Issues
Too much disk IO on sda in RAID10 setup | blog.windfluechter.net
How to be More Productive by Using the “Eisenhower Box”
GDPR Myth #1: Fine of 4% of global turnover for your first GDPR offence | VinciWorks Blog
Senators Demand Voting Machine Vendor Explain Why It Dismisses Researchers Prodding Its Devices
Displaying IP Info on Console with Netplan – Fixing IT
Julia Reda – In January, the EU starts running Bug Bounties on Free and Open Source Software
TheHive Project – Open Source, Free and Scalable Cyber Threat Intelligence & Security Incident Response Solutions
Tesla Model 3 known good accessories | TinkerTry IT @ Home
PRETty - "PRinter Exploitation Toolkit" LAN Automation Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Tesla Model 3 replacing my 13 year old Honda Civic Hybrid, let's see how that goes. So far, so good! | TinkerTry IT @ Home
7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions - Data Security Blog | Thales eSecurity
Docker Security Tips & Best Practices – Threat Stack
Healthcare IT Continues to Struggle with Backup Strategies - Security Boulevard
9 Benefits of ISO 27001 Certification (Some You Know, Some You Probably Don’t) | Pivot Point Security
Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack — Krebs on Security
MISP - Malware Information Sharing Platform and Threat Sharing - The Open Source Threat Intelligence Platform
The Docker Bench For Security - A Script That Checks For Dozens Of Common Best-Practices Around Deploying Docker Containers In Production - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
XSRFProbe - The Prime Cross Site Request Forgery Audit And Exploitation Toolkit - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
The 4 stages of cyber resilience - IT Governance Blog
The End (of 2018) Is Near: Looking Back for Optimism
New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
New cybersecurity rules take effect in South Carolina
Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients - HICP-Main-508.pdf
Analyzing the Portuguese DPA's first GDPR fine
Marriott Provides Update on Starwood Database Security Incident
25 Years Later: Looking Back at the First Great ...
2018 Health Data Breach Tally: An Analysis - HealthcareInfoSecurity
Do not look for Cheap Black Friday Deal​ Testing - EvilTester.com
The Difference Between Security and Privacy | Daniel Miessler
Major US newspapers crippled by Ryuk ransomware attack | CSO Online
Japan seeks cyberattacks to be in scope of security treaty with U.S. - Japan Today
Why Automation Matters : Consistent Test Environments | The ORACLE-BASE Blog
Easy PXE boot testing with only HTTP using iPXE and libvirt
10 ways to use OneNote for Project Management - SharePoint Maven
Extend the evaluation period of Windows Server 2012/2016 and 2019 - ivobeerens.nl
Recognizing Vendor Risks to National Security in the CFIUS Process - Lawfare
How the Boston Children’s Hospital Is Innovating on Top of an Open Cloud
7 Nginx Rewrite Rule Examples with Reg-Ex and Flags
The Developer Coefficient
Yammer Seen Counts for Conversations – All About I.T.
The two most important ways to defend against security threats | CSO Online
Introduction to Cryptography Basic Principles
weblogic - how to change listen port from default 7001 to something different? - Stack Overflow
How to change the default port of weblogic (7001) (BEA/Weblogic forum at Coderanch)
10 Google Docs Tips That Take Seconds and Save You Time
Launching Rational Cybersecurity for the Business | Security Architects Partners Dan Blum
Erman Arslan's Oracle Blog: RDBMS -- TLS 1.2 support and issues ORA-29263: HTTP protocol error & ORA-29024: Certificate validation failure
Erman Arslan's Oracle Blog: Oracle Seminar -- Oracle Technologies and Oracle Products + Oracle Job roles
Erman Arslan's Oracle Blog: Exadata -- Exadata X3 reimaging problem -- biosbootorder
Erman Arslan's Oracle Blog: Weblogic -- Performance problem - Forms & Reports environment -- Unable to load performance pack / libmuxer.so
Change the Listen Port for Weblogic AdminServer #Oracle #IDM #Identity - TUMY | TECH
Erman Arslan's Oracle Blog: Weblogic -- HACMP Configuration, IP Address Change
The Finnish Hyperion Guy: Tidy Up WebLogic Server After EPM System Installation
Vulnerability Management Part 1 I Pivot Point Security
Yes: Your Law Firm Needs to Do a Business Impact Analysis | Pivot Point Security
WebLogic AdminServer Port Conflict Remote Running on PC
Java mon amour: Installing JIRA
Java mon amour: Jboss CLI, change individual attributes of a security domain without having to remove and add the domain from scratch
Java mon amour: java showSettings
Default Port Numbers You Need to Know as an Administrator
Why Tenable/NESSUS requires full level 15 access for Cisco devices? Don’t need it.
Security/TLS Configurations - MozillaWiki
Security/Server Side TLS - MozillaWiki
Transport Layer Protection Cheat Sheet - OWASP
Oracle – Got minus one from a read call – How to tackle? | {"code":"java"}
Come Across: Presenting : Explore and Implement SharePoint Security: Permissions, Identities, and Objects @ NCS SharePoint CoP Group
Security Update Guide
CyGraph: Cybersecurity Situational Awareness That’s More Scalable, Flexible & Comprehensive - Neo4j Graph Database Platform
TDS Endpoints: SQL Server's "Listener" | ColleenMorrow.com
Private Investigator - Stillinger investigations
How a U.S. Health Care System Uses 15-Minute Huddles to Keep 23 Hospitals Aligned
Automotive Cybersecurity
CDRH’s Medical Device Safety Action Plan – An Aspirational Blueprint for Addressing Medical Device Safety | Health Law | STAT
Thora A. Johnson
Active Directory® 101 - JumpCloud
How to check if your processor supports Virtualization Technology on Ubuntu
Chris's Wiki :: blog/linux/ZFSFileserverSameness
Malwarebytes IT Security Predictions 2019 | Born's Tech and Windows World
Serverless OpenLDAP™ - Security Boulevard
The Best of Shape Security 2018 - Security Boulevard
OPTPOLINES - Formerly Relpolines, Lower Overhead To Retpolines For Spectre Mitigation - Phoronix
Local stratum-1 NTP server
Ubiquiti Unifi setup
Touchless health monitoring module works with Raspberry Pi
Home - ROI-NJ
MacOS Security Baseline Script – JerryGamblin.com
Favorite Security Books Of 2018 – JerryGamblin.com
Welcome to ServerlessSecurity.org! | ServerlessSecurity.org
Host Websites On Github – JerryGamblin.com
SQL Server 2014 Service Pack 3 is now Available!!! | SQL Server Release Services
Adam Shostack's personal homepage
The Hard Truth About G2A, Kinguin and Grey Market Keys – Locke's Journey
Understanding the unique Israeli concept of Rosh Gadol (ראש גדול)-updated | Allon Shevat
News – Joel on Software
GitHub - cybermaggedon/cyberprobe: Capturing, analysing and responding to cyber attacks
What Are Cipher Suites? - Security Boulevard
Jacek Kowalczyk / my-debian · GitLab
Looking Back at the Top Cyber-Securities Issues of 2018
Cyber and Technology Resilience: Themes from cross-sector survey 2017 - 2018 - technology-cyber-resilience-questionnaire-cross-sector-report.pdf
The Life of Kenneth: FCIX - State of the Exchange
On Thinking About Infrastructure as Code - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Hilbert’s list | Seth's Blog
1. High efficiency, sustainable method for growing sufficient food, including market-shifting replacements for animals as food 2. High efficiency, renewable energy sources and useful batteries (cost, weight, efficiency) 3. Effective approaches to human trafficking 4. Carbon sequestration at scale 5. Breakthrough form for democracy in a digital age 6. Scalable, profitable, sustainable methods for small-scale creators of intellectual property 7. Replacement for the University 8. Useful methods for enhancing, scaling or replacing primary education, particularly literacy 9. Beneficial man/machine interface (post Xerox Parc) 10. Cost efficient housing at scale 11. Useful response to urban congestion 12. Gene therapies for obesity, cancer and chronic degenerative diseases 13. Dramatic leaps of AI interactions with humans 14. Alternatives to paid labor for most humans 15. Successful interactions with intelligent species off Earth 16. Self-cloning of organs for replacement 17. Cultural and nation-state conflict resolution and de-escalation 18. Dramatically new artistic methods for expression 19. Useful enhancements to intellect and mind for individuals 20. Shift in approach to end-of-life suffering and solutions for pain 21. Enhanced peer-to-peer communication technologies approaching the feeling of telepathy 22. Transmutation of matter to different elements and structures 23. Off-planet outposts It’s going to get interesting. Especially if we can imagine it.
Cybersecurity and Insurance | Hackaday
Patch Lady – vendors start to shut the doors on Windows 7 @ AskWoody
Find Windows 10 Upgrade Blockers with PowerShell – smsagent
FYI: End of Support for Windows 7, SQL-Server 2008 and more | Born's Tech and Windows World
Effective Mental Models for Code and Systems – Cindy Sridharan – Medium
The Art of Vacuum Tube Fabrication | Hackaday
configuring_ssl_for_oracle_client_with_cac_using_mcs_3.pdf
GitHub - pmdba/plsql-pii-scanner: An example of a method for scanning the Oracle data dictionary for potential PII data and automating specific responses, such as encrypting of columns or alerting the DBA, when new data is found.
Finding And Fixing Node.js Memory Leaks: A Practical Guide | eknori.de
Firejail - Securely Run Untrusted Applications in Linux
I Hunt Sys Admins - The Intercept
How China’s Elite APT10 Hackers Stole the World’s Secrets | WIRED
How To Organize Your Income And Expenses
How VMware Certifications changed my life -
Getting started with chaos engineering | Opensource.com
Chris's Wiki :: blog/linux/ZFSFileserverSetupIII
Creating a useful spec | Seth's Blog
NASA Astronomer Nancy Grace Roman, 'Mother' Of Hubble Space Telescope, Is Dead : NPR
PostgreSQL-Diagnostic-Queries – DB-Tune
Hackers Attack IPMI Default Passwords to Deploy Ransomware On Linux Servers - Latest Hacking News
EU offers bounties to help find security flaws in open source tools
Malware stalls delivery of LA Times and other major US newspapers
Linux ip Command Examples - nixCraft
Azure in the Government of Canada - Eric’s Azure Blog
Penetration Testing on Group Policy Preferences
From Encrypting the Web to Encrypting the Net: 2018 Year in Review | Electronic Frontier Foundation
Side-Channel Vulnerability Variants 3a and 4 - Spectre and Meltdown - blackMORE Ops
Building a PowerShell Process Memory Tool • The Lonely Administrator
How to add network driver to Windows 10 PE | Marco Franssen
Put your ssh experience in Windows on Steroids | Marco Franssen
DSHR's Blog: Securing The Hardware Supply Chain
Top 5 Cybersecurity Priorities for 2019: Ponemon Study - Blog | Tenable®
Healthcare Data Breaches Associated with 64% Increase in Advertising Expenditures - Security Boulevard
Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018
Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018 - Security Boulevard
Healthcare Cybersecurity in 2019: The Time is Now - Security Boulevard
Top 20 Most Popular Hacking Tools in 2018 - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Improving DNS logging, dnstap on Ubuntu - Koen Van Impe - vanimpe.eu
Data Sanitization 5.3 release | OPSWAT
The Year of the GDPR: 2018’s Most Famous Privacy Regulation in Review | Electronic Frontier Foundation
Blog Exploits on the Rise | Onapsis
Selenium IDE Tactical or Strategic? - Evil Tester - Technical Testing with Skill, Attitude and Pragmatism
Looking Back: 2018 Project Report Card - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
An Internet Outage Could Kick In WannaCry Ransomware Again
The elements of cybersecurity hygiene and secure networks -- Part 2
The elements of cybersecurity hygiene and secure networks -- Part 1
Cuckoo – Sandboxed Malware Analysis – ls /blog
Chris's Wiki :: blog/sysadmin/MetricsAndUnderstandingMore
The Best Maker YouTube Channels | Cool Tools
Intel 5500 chipset heatsink tuning
Smokeping – network latency monitor with Raspberry Pi – Alexander's Blog
Context: Your Super-Weapon in Vulnerability Management? - Security Boulevard
Industrial Control Systems Healthcheck | Mandiant | FireEye
PCI Pal and Verizon White Paper Examines PCI Security Compliance in Contact Centre Environments - Security Boulevard
Apache Struts Vulnerabilities vs Spring Vulnerabilities — One of these popular open source projects might be riskier than the other - Security Boulevard
Defense in Depth: 4 Essential Layers of ICS Security
AWS Lambda Security Quick-Start Guide
Secure & Compliant Payment Solutions for Contact Centres | PCI Pal
OWASP Top 10 Security Risks – Part II - Security Boulevard
Software Monitoring for NERC CIP Compliance: Part 1
Continuous Monitoring : Academic Paper - Security Boulevard
OWASP Top 10 Vulnerabilities List — You’re Probably Using It Wrong
A Brief Introduction to the OpenVAS Vulnerability Scanner
Tis the Season to Check your SSL/TLS Cipher List Thrice (RCurl/curl/openssl) - Security Boulevard
Cybersecurity is Increasingly Important for M&A Dealmakers - Security Boulevard
PIPEDA & MDR: Breaches, Reporting and Advice
Shared responsibility model: Who owns cloud security? - Security Boulevard
RACI matrix in ISO 27001 implementation – How to use it?
Negative Impact of Incorrect CSP Implementations - Security Boulevard
Future Crimes by Marc Goodman (Book Summary) - Security Boulevard
37% of Ransomware Attacks Targeted Healthcare Organizations in Q3, Cyber Insurer Says - Security Boulevard
PIPEDA Best Practices Achieved with MDR - Part 2 - Security Boulevard
PIPEDA Best Practices Achieved with MDR - Security Boulevard
Achieve CIS Compliance in Cloud, Container and DevOps Environments
FreeRADIUS for MSPs - Security Boulevard
Ten Ways Your Healthcare Org May Be Violating HIPAA - Security Boulevard
36 Best Business Books that Changed Microsoft Leaders’ Lives – J.D. Meier's Blog
How I Became A Believer In Consuming IT Security As A Service - Security Boulevard
5 lessons public wi-fi can teach us about cybersecurity - Security Boulevard
Apache Struts Vulnerabilities Burden Us With a ‘Stay or Go’ Deliberation - Security Boulevard
A Little Guide to SMB Enumeration
NHS is still assessing the cost of WannaCry one year laterSecurity Affairs
CompTIA A+ Renewal Process - Security Boulevard
Security Vulnerability in Internet-Connected Construction Cranes - Schneier on Security
How to Enable HTTP/2 in Nginx
Spectre mitigation guts Linux 4.20 performance – Naked Security
InfoSec Handlers Diary Blog - Restricting PowerShell Capabilities with NetSh
Pedagogic-cybersecurity-framework.pdf
6 years of Raspberry Pi in video | Opensource.com
stoQ - An Open Source Framework For Enterprise Level Automated Analysis - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Keyfinder - A Tool For Finding And Analyzing Private (And Public) Key Files, Including Support For Android APK Files - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
6 Ways to Anger Attackers on Your Network
Reddit helps admin solve mystery of rogue Raspberry Pi – Naked Security
Why a Helium Leak Disabled Every iPhone in a Medical Facility - Motherboard
ꓘamerka — Build interactive map of cameras from Shodan
Here's How Easy It Is to Make Your Own IMSI-Catcher
Libvirt Fencing on a Physical KVM Host | Lisenet.com :: Linux | Security | Networking
Yubico Security Key Review (The complete edition)
SQLiScanner - Automatic SQL Injection With Charles And Sqlmap API - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Understanding the 7 different types of data breaches - Security Boulevard
Voice of the Customer: The Walsh Group found that Azure Active Directory gives them a competitive edge - Security Boulevard
Star WannaCry victim NHS to ban fax machines by 2020 - Security Boulevard
New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
Notes on Build Hardening - Security Boulevard
5 Key Components Every Company Should Have in Their Privacy Policy - Security Boulevard
The Top 5 Third-Party Cyber Gaps of 2018 - Security Boulevard
Ahead of the Curve: University Incident Response Plans and Communications - Security Boulevard
OWASP 'ServerlessGoat': A Vulnerable Demo Serverless Application - Security Boulevard
The Year Ahead: Cybersecurity Trends To Look Out for In 2019 - Security Boulevard
What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3? - Security Boulevard
Why TLS 1.3 is a Huge Improvement - Security Boulevard
Strategic Ways to Add Value to Your IT Consulting Business
Beyond Scanning: Don’t Let AppSec Ignorance Become Negligence - Security Boulevard
GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019 - Security Boulevard
Want Your R&D Team to Rock? 7 Tips to Help Your Developers Perform Like a Supergroup - Security Boulevard
Top 30 Supervisory Control and Data Acquisition (SCADA) Technician Interview Questions and Answers for 2019 - Security Boulevard
3 Reasons Osquery Should Be On Every Incident Responders Christmas List - Security Boulevard
Healthcare Cybersecurity in Intensive Care - Security Boulevard
Flaws and Vulnerabilities and Exploits – Oh My! - Security Boulevard
5 tips to secure your supply chain from cyberattacks - TechRepublic
We Asked 105 Experts What Worries Them Most About the Future - Motherboard
testssl.sh - Testing TLS/SSL Encryption Anywhere On Any Port - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
XSStrike v3.0 - Most Advanced XSS Detection Suite - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Lynis 2.7.0 - Security Auditing Tool for Unix/Linux Systems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CAINE 10.0 - GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
SpiderFoot - The Most Complete OSINT Collection And Reconnaissance Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
DevAudit - Open-source, Cross-Platform, Multi-Purpose Security Auditing Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CRS - OWASP ModSecurity Core Rule Set - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Jackhammer - One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
The 4 phases of a business continuity plan - IT Governance Blog
List of data breaches and cyber attacks in November 2018 - 251,286,753 records leaked - IT Governance Blog
How to create a business continuity plan – with free template - IT Governance Blog
How to build a cyber incident response team - IT Governance Blog
7 of the most common cyber attacks you need to prepare for - IT Governance Blog
Your checklist for responding to and reporting data breaches - IT Governance Blog
10 things you must do to become cyber secure - IT Governance Blog
Your DPO questions answered in an interview with information security experts - IT Governance Blog
Phishing, Ransomware Attacks Continue to Menace Healthcare
Why NIST is so popular in Japan
7 CI/CD tools for sysadmins | Opensource.com
Australia's new 'decryption' law and its effect on tech companies worldwide
HOWTO: Calculate Elapsed Business Hours Using PowerShell – Please Work
Network UPS Tools | Calvin Bui
VMware vSphere Security - Getting Started Hands-on Lab
People First – The Frequently Overlooked Importance of Culture Change in DevOps Journeys – Premier Developer
Colorado Embraces New IT Security Philosophy
Zero Trust part 1: Identity and access management - Microsoft Secure
StarWind rPerf free tool • Nolabnoparty
HTTP vs HTTPS – lakkireddymadhu
How protected are you against cyber-attacks? – lakkireddymadhu
All major browsers drop TLS 1.0 and 1.1 in 2020 – lakkireddymadhu
How To Set Up Nginx with HTTP/2 Support on Ubuntu 16.04 | DigitalOcean
HTTP/2 – lakkireddymadhu
World Computer Security Day – lakkireddymadhu
How to Find Hidden & Saved Passwords in Windows 10 – lakkireddymadhu
How to Be Invisible Online (Without Going off the Grid) – lakkireddymadhu
Visibility vs Results | The ORACLE-BASE Blog
10 Cybersecurity Myths – lakkireddymadhu
Penetration Testing Techniques: Conducting effective recon for enhanced phishing (Office 365 edition) – David Vassallo's Blog
Find email addresses in seconds • Hunter (Email Hunter)
HTTP/3 – lakkireddymadhu
HHS Deputy Secretary Eric Hargan Describes Cyber Initiative
Analysis: Did Anthem’s Security ‘Certification’ Have Value?
Health Data Breach Tally: Analyzing the Latest Trends
Getting Started with Desired State Configuration Resources for VMware - VMware PowerCLI Blog - VMware Blogs
Medical Devices: The Long Road to Security - HealthcareInfoSecurity
5 – 15s DNS lookups on Kubernetes? – Quentin
Marriott: Data on 500 Million Guests Stolen in 4-Year Breach — Krebs on Security
Installing metasploitable with vagrant
What the Marriott Breach Says About Security — Krebs on Security
HHS Seeks Feedback on Potential HIPAA Changes
Incident Response: Why a Tabletop Exercise Is Essential
SlithIR · trailofbits/slither Wiki · GitHub
Slither – a Solidity static analysis framework | Trail of Bits Blog
Cybersecurity Trends to Watch Out for in 2019 | Webroot
Windows Incident Response: Veteran Skillz
GDPR Compliance: The Role of Vendor Risk Management
Does HIPAA Need to Be ‘Modernized’? - HealthcareInfoSecurity
What is a VMware VIB file?
How to Patch vCenter Server Appliance (VCSA) - [Guide] | ESX Virtualization
I just setup WireGuard, and I’ll never go back to OpenVPN | Logan Marchione
Windows Incident Response: Basic Skillz, pt II
Windows Incident Response: Basic Skillz
Though 2018 Will Likely Not Surpass 2017 Numbers – Still Significant Year For Breach Activity
On Pace To Break 20k Mark For Disclosed Vulnerabilities
Visualise Sysmon Logs and Detect Suspicious Device Behaviour -SysmonSearch- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Visualise Event Logs to Identify Compromised Accounts - LogonTracer - - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
What Is the OBD-II Port and What Is It Used For?
5 Cybersecurity Predictions for 2019
Cyber Security Lessons from Abroad – Australia’s Essential Eight
Addressing the CISO’s Key Challenges in 2018 and Beyond with Endpoint Detection and Response
Multiple Ways To Exploiting HTTP Authentication
ODA : Free up space on local filesystems - Blog dbi services
2018 in cybersecurity: Regrets, we have a few
How To Install OpenLDAP Server for Centralized Authentication
Listen to the radio at the Linux terminal | Opensource.com
Web Proxy Penetration Lab Setup Testing using Squid
Hack the Box: Jerry Walkthrough
Comprehensive Guide on Dirbuster Tool
HTTP Banner Grabbing Beyond The Root - DigiNinja
Nessus Through SOCKS Through Meterpreter - DigiNinja
Blog, Integrating GNS3 and VirtualBox - DigiNinja
Wifi Honey - DigiNinja
Multiple Ways to Exploit Tomcat Manager
Thanos: long-term storage for your Prometheus Metrics on OpenShift – Red Hat OpenShift Blog
FAIRCON Showcases Quantitative Risk Analysis on the Cusp of Adoption | Security Architects Partners
How to Establish a Security Culture | Security Architects Partners
Securezoo Articles
Routes-apply.sh - Safely apply routes and revert on error | Sebastian Neef - 0day.work
Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough
Here are the most common cyber security threats that occur in the healthcare sector
2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 1)
7 Ways an Old Tool Still Teaches New Lessons About ...
9 Traits of A Strong Infosec Resume
7 Free (or Cheap) Ways to Increase Your ...
6 Python and containers videos worth watching | Opensource.com
Patching the vCenter Server Appliance (VCSA) using the REST API
Dream of augmented humans endures, despite skeptics - Japan Today
How To Install IIS In Windows Server 2019 - RootUsers
How To Enable Remote Desktop In Windows Server 2019 - RootUsers
U.S. GAO - Information Security: Significant Progress Made, but CDC Needs to Take Further Action to Resolve Control Deficiencies and Improve Its Program
DSHR's Blog: Securing The Software Supply Chain
U.S. GAO - Federal Building Security: Actions Needed to Help Achieve Vision for Secure, Interoperable Physical Access Control
U.S. GAO - Information Security: Agencies Need to Improve Implementation of Federal Approach to Securing Systems and Protecting against Intrusions
SQL Server Linux: fsync and Buffered I/O – SQL Server According to Bob
SQL Server On Linux: Forced Unit Access (Fua) Internals – SQL Server According to Bob
How to become an AWS expert | AWS News Blog
Serverless and startups, the beginning of a beautiful friendship | AWS News Blog
ESXi 6.5.0 fails to boot with Error loading /a.b00 – Virtually Sober
How to Enable TLS 1.3 in Nginx
Security operations activities to watch in 2019 | CSO Online
The Difference Between a Penetration Test and a Red Team Engagement | Daniel Miessler
Automating a DevOps-Friendly Security Policy
A Container Hacker’s Guide to Living Off of the Land – Professionally Evil Insights
Measuring container security [LWN.net]
Security Considerations for Container Runtimes - RHD Blog
Deploying SQL Server on K8s with Helm charts
Virtual Patching or Good Security Design instead?
A checklist for overcoming life and career setbacks - 80,000 Hours
A year's worth of education for under a dollar and other 'best buys' in development, from the UK aid agency's Chief Economist - 80,000 Hours
Response: A Chief Security Concern for Executive Teams - EtherealMind
Zen of Routing Protocols « ipSpace.net blog
Red Hat Global Customer Tech Outlook 2019: Automation, cloud, & security lead funding priorities
A Chief Security Concern for Executive Teams — Krebs on Security
5 Dedicated Server Security Vulnerabilities and How to Troubleshoot Them – ThisHosting.Rocks
HardenedBSD 12 Released With Jailed Bhyve, Disables SMT By Default - Phoronix
Closing the Global Cyber Enforcement Gap - Lawfare
NASA discloses October security breach
The US ballistic missile system is a cybersecurity nightmare
Errata Security: Masscan as a lesson in TCP/IP
Scalable Log Collection as Foundation of SOCRafeeq Rehman – Personal Blog
New Report Highlights Biggest Risks to Endpoint Security
2018's Most Active Ransomware: The Ongoing Evolution of GandCrab
Errata Security: Some notes about HTTP/3
Some of My Favorite Shell Aliases From Over the Years | Daniel Miessler
bus.gif (GIF Image, 450 × 300 pixels)
Microsoft Teams Licensing Guide |
DSCR for VMware and you! - LucD notes
MPECS Inc. Blog: OS Guide: Slipstream Updates Using DISM and OSCDImg *Updated
2019 Application Performance Management Predictions - Part 3 | APMdigest - Application Performance Management
2019 Application Performance Management Predictions - Part 2 | APMdigest - Application Performance Management
2019 Application Performance Management Predictions - Part 1 | APMdigest - Application Performance Management
AWS Security Hub - The IT Hollow
Troubleshooting Query timeouts in SQL Server – Don Castelino
How to stress and measure the Garbage Collector – Calvin Hsia's WebLog
Azure Database for PostgreSQL performance Quick Tips – Azure SQL Database Support
Announcing .NET Framework 4.8 Early Access build 3673 | .NET Blog
LUIS: Notes from the Field of Natural Language Processing – Actual Intelligence
Release: SQL Server Migration Assistant (SSMA) v7.11 – Microsoft Data Migration Blog
How to Encrypt SQL communication on the wire – The dot before the Net
Ten Immutable Laws Of Security (Version 2.0) – Roger's Security Blog
Dubious security vulnerability: A program that adds a user to the Administrators group in the usual way – The Old New Thing
The AI Journey | Steve "Guggs" Guggenheimer's Blog
Enforcing TLS 1.2 use with Azure Service Bus – Service Bus
Azure Data Architecture Guide – Blog #6: Business intelligence – AzureCAT Guidance
Azure Data Architecture Guide – Blog #5: Clickstream analysis – AzureCAT Guidance
Azure Data Architecture Guide – Blog #4: Hybrid data architecture – AzureCAT Guidance
Azure Data Architecture Guide – Blog #3: Advanced analytics and deep learning – AzureCAT Guidance
Azure Data Architecture Guide – Blog #2: On-demand big data analytics – AzureCAT Guidance
Azure Data Architecture Guide – Blog #1: Introduction – AzureCAT Guidance
DSC Resource Kit Release November 2018 | PowerShell Team Blog
Is there a marketing person leading the IT team? – Blog FiascoBlog Fiasco
Windows Server 2019 and Containers – Azure Development Community
Azure DevTest Labs: CIS Windows Server 2016 Benchmark L2 available in your lab – Azure DevTest Labs Team Blog
Meetup replay: Women Leading Government Cybersecurity – Microsoft Azure Government
Exclusions antivirus pour IIS / Antivirus exclusions for IIS – Laurent VAN ACKER's Blog : IIS, PowerShell, ASP.Net …
Free Azure Subscription–no credit card needed | Wriju's BLOG
Clean up after yourself Docker, your mom isn’t here! – Freddys Blog
Ultimate: The Ultimate Image Browser.
Remote Use of Local Accounts: LAPS Changes Everything – Microsoft Security Guidance blog
The Most Important Thinking Habit Nobody Taught You
InfoSec | Daniel Miessler
2018: The rise of Cryptominers | CyberWatch
10 top security enhancements in Windows Server 2019 | CSO Online
An Epidemic of Healthcare Breaches | CyberWatch
A Bevy of Botnets | CyberWatch
2018.11.06.VA.HIMSS.Staynings - 2018.11.06.VA.HIMSS.Staynings.pdf
7 unexpected ways GDPR and other privacy regulations make security harder | CSO Online
Dark web websites: 10 things you should know | CSO Online
9 cyber security predictions for 2019 | CSO Online
How to set up a successful digital forensics program | CSO Online
The state of ICS and IIoT security in 2019 | CSO Online
Experience an RDP attack? It’s your fault, not Microsoft’s | CSO Online
A Layered Approach to Cybersecurity: People, Processes, and Technology | CSO Online
Who is responsible for IoT security in healthcare? | CSO Online
12.07.18-Cybersecurity-Strategy-Report.pdf
Finally, a meaningful congressional report on stemming cybersecurity attacks | CSO Online
Response: Australian Encryption Laws Explained - EtherealMind
Secure Your Computer by Modifying the Default RDP Port Number | Alexander's Blog
System Requirements for Microsoft Exchange Server 2019 | Alexander's Blog
The Endless Cycle of ERP Security | Onapsis
Blog Cybersecurity for SAP Customers | Onapsis
Python Backup Cleaner Script | Calvin Bui
Errata Security: Notes on Build Hardening
Adding NVMe to Server | blog.windfluechter.net
Global Entry Program - Ultimate 2018 Guide [Map of Locations & Kiosks]
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 6 - Loading the example HR Schema - mwpreston.net
Creating Colorful HTML Disk Reports with PowerShell • The Lonely Administrator
Feature Releases are the Future and They Require CI, CD and Feature Flags - via @codeship | via @codeship
Free Online Learning at GCFGlobal
Weak passwords banned in California from 2020 - BBC News
People do not quit companies, managers, or leaders – they quit organizational cultures. Here’s why. | Christie Lindor :: Management Consultant :: Blogger :: Author
How to install Redis on a Raspberry Pi using Docker | thisDaveJ
180+ Benchmarks On Debian GNU/Linux 9.6 Against Debian Buster Testing - Phoronix
Where are the Linchpin jobs? | Seth's Blog
Electronics 101.1: Electricity basics - Raspberry Pi
Back Issues & books - The MagPi MagazineThe MagPi Magazine
American Fascism 2– Is the United States Fascist? – Michael O. Church
American Fascism 1– What Is Fascism, and How Did It Get Here? – Michael O. Church
13 Legal Online Sources to Download Free Christmas Music
How to Solve Blue Screen Errors Using WinDbg and BlueScreenView
What Is Wi-Fi 6 and Do You Need a New Router?
James Gosling's Surprise Announcement at Devoxx: Amazon Corretto
Is the new Java release cycle an improvement?
The BNC Connector and How It Got That Way | Hackaday
Hack My House: Opening Raspberry Pi to the Internet, but Not the Whole World | Hackaday
Hack My House: ZoneMinder’s Keeping an Eye on the Place | Hackaday
Hack My House: Running Raspberry Pi Without an SD Card | Hackaday
DeployHappiness | Don’t Fail to Plan – Create or Update Your DR Plan Now!
Repurpose Optical Drive With RPi : 6 Steps (with Pictures)
Daphne Oram and the Birth of Electronic Music | Hackaday
Building Your Own Virtual Lab « ipSpace.net blog
Liveblog: Hardening Kubernetes Setups - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Research: The Guidelines On Cyber Security Onboard Ships - EtherealMind
Windows 10 Sends Your Activity History to Microsoft, Even if You Tell It Not To
How to plan your smart home - and weigh privacy risks - Japan Today
The Permanent Gift Guide 2018 – Buy Stuff That Lasts Forever — My Money Blog
Maria Butina: Cybersecurity charlatan, spy
Maria Butina
5 things you won't learn from The Open Organization Leaders Manual
Transparent Data Encryption - Certificate in master database: is it really a good practice? - Blog dbi services
Real-Time Incident Response and Forensics Capabilities Debut in Twistlock 2.5
How To Benchmark Linux Commands And Programs From Commandline
McFly - A Replacement To 'Ctrl+R' Bash History Search Feature
Essential System Tools: Timeshift - Reliable system restore tool for Linux - LinuxLinks
Litigating Data Sovereignty - Lawfare
Fixed vs. Growth: The Two Basic Mindsets That Shape Our Lives - Brain Pickings - Pocket
How to install VeraCrypt on Kali Linux - LinuxConfig.org
5 Ways To Check Laptop Battery Status And Level From Linux Terminal | 2daygeek.com
Testing Your Code with Python's pytest, Part II | Linux Journal
50 years ago, 'the mother of all demos' foretold our tech future
Which matters more for building wealth: your saving rate or your investment returns?
U.S. GAO - Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities
Migrating SQL Server Reporting Services (SSRS) | Tallan's Blog
The Life of Kenneth: Inspiration for Date Nights
Ransomware at the Library: Time to Boost Your Cybersecurity » Public Libraries Online
Lotus Bloody Notes/Domino Sold - EtherealMind
How to Build an Automated Culture in Your Company
DSHR's Blog: John Wharton RIP
Project PITA: Build a Mini Mass Deauther Using Bettercap and a Raspberry Pi Zero W
Z-Wave : Lessons Learned – Python OpenZwave – David Vassallo's Blog
Creating the next generation of cybersecurity leaders
Open Source Security and License Management | WhiteSource
The Five Ways of Devops | The IT Skeptic
ML engineering for AI safety & robustness: a Google Brain engineer's guide to entering the field - 80,000 Hours
Retrofitting Apps for Cloud Storage with Zero Code Changes - mtlynch.io
Cloud Vampires - Thomas LaRock
MPECS Inc. Blog: New PowerShell Guides and DISM Slipstream Process Updated
Non-secure network connections in Carnival Cruise’s app – Scott Gruby's Blog
My macOS Mojave / Proxmox setup – Nicholas Sherlock
Proxmox storage tips/HDD pass through – it's notes
Troubleshooting CyberPower PowerPanel issues in Linux · major.io
SQL SERVER – Unable to Start SQL When Service Account is Removed From Local Administrators Group. Why? – it's notes
Using DISM to Create a Repeatable IIS Installation - Devops Blog
Wireshark Week - Troubleshooting Performance in the Cloud (by Paul Offord)
Keeping Your House In Order (by Tony Fortunato)
Installing Second Domain Controller using Ansible | geekdudes
Install first domain controller (AD Forest) using Ansible | geekdudes
Instaling Ansible on CentOS 7 and adding Windows node | geekdudes
Installing Chocolatey server using Ansible | geekdudes
Microsoft Security Compliance Toolkit 1.0 available | Born's Tech and Windows World
Microsoft has updated the Meltdown/Spectre information page | Born's Tech and Windows World
Chris's Wiki :: blog/linux/DiskIOStatsIII
Cyber attack from russion ‘Snake’ group on German und US government agency and military | Born's Tech and Windows World
Harden Windows networks with AD option against NotPetya | Born's Tech and Windows World
New SplitSpectre-Attack; Windows Retpoline Spectre Mitigation | Born's Tech and Windows World
AWS re:Invent 2018: Enterprise Governance: Build Your AWS Landing Zone - ENT351 - WoodITWork.com
AWS re:Invent 2018: Werner Vogels Keynote Thoughts - WoodITWork.com
German District Hospital: IT systems grounded by a virus | Born's Tech and Windows World
Pure Storage - Seeding the NVMe Market | Architecting IT
vSphere 6.7 Update 1 Upgrade - VirtuallyInclined.com
vSAN Encryption Mind Map – Data at rest – Elastic Sky
VMware Network Port Diagram v6.x
How to open the firewall port for SQL Server on Windows Server 2008 – Cloud & Virtualization Complete Guide Donations Are Welcome Please Send money to this below bank account. Account Name – Sheik Ahmed SM Bank name – hdfc Account No – 50100110300427 IFSC Code – HDFC0000004 Chennai India
netboot.xyz :: netboot.xyz
Why BSD/OS is the best candidate for being the only tested legally open UNIX. – Virtually Fun
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 5 - Connecting to Oracle Databases with SQL Developer - mwpreston.net
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 4 - Creating Databases - mwpreston.net
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 3 - Installing Oracle Database 12C Software - mwpreston.net
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 2 - Oracle Database Prerequisites - mwpreston.net
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 1 - Oracle Linux Install - mwpreston.net
KVM networking: a simple way to manage port forwards and configuration - SUSE Communities
New – Automatic Cost Optimization for Amazon S3 via Intelligent Tiering | AWS News Blog
Firecracker – Lightweight Virtualization for Serverless Computing | AWS News Blog
IBM selling Lotus Notes/Domino business to HCL for $1.8B | TechCrunch
New – Amazon FSx for Windows File Server – Fast, Fully Managed, and Secure | AWS News Blog
AWS Cloud Map: Easily create and maintain custom maps of your applications | AWS News Blog
New – AWS Well-Architected Tool – Review Workloads Against Best Practices | AWS News Blog
25 Log Files That Will Transform Your vSphere Troubleshooting
About Configuration Drift, Pester and Vester | Adventures in a Virtual World
Why flat SharePoint Site Architecture makes total sense - SharePoint Maven
Why Automation Matters : Keep Your Auditors Happy | The ORACLE-BASE Blog
Autonomous Database : "Hand-tuning doesn't scale" | The ORACLE-BASE Blog
Even ACEs Make Mistakes : You never forget the first time you drop the production database! | The ORACLE-BASE Blog
Why Automation Matters : Technical Debt | The ORACLE-BASE Blog
Why Automation Matters : The Series | The ORACLE-BASE Blog
Why Automation Matters : Continuous Improvement and Buying Time For Yourself | The ORACLE-BASE Blog
Why Automation Matters : Can't the cloud do it for you? | The ORACLE-BASE Blog
Why Automation Matters : Unplanned Work and Death of Productivity! | The ORACLE-BASE Blog
Why Release Update Revisions (RUR) are tricky - and why RUs are better
All of the Tuning Features in SQL Developer (2018) | ThatJeffSmith
PeopleSoft Top 10 Security Risks | Integrigy
How to fix OUI-10022 error on an ODA - Blog dbi services
OUI-10022
opatch investigations | Frits Hoogland Weblog
opatch versions | Frits Hoogland Weblog
Oracle Open World 2018 D1: Larry Ellison keynote Cloud Gen2 - Blog dbi services
Oracle OpenWorld 2018: Day 3 - Blog dbi services
HHS OIG Launches Cybersecurity Webpage to Raise Awareness and Boost Cybersecurity Best Practices - Lexology
HHS OIG explains that it currently uses a three-pronged approach to safeguard data and the systems on which its data is stored: IT security controls, risk management, and resiliency
House Energy and Commerce Committee unveils cyber plan - POLITICO
Deploy DC/OS using Ansible (Part 2) - Playbooks - Blog dbi services
Deploy DC/OS using Ansible (Part 1) - Getting Started - Blog dbi services
Happy Birthday Notes and Domino ... and now for something completely different
Cybersecurity | Featured Topics | Reports & Publications | Office of Inspector General | U.S. Department of Health and Human Services
5 Ways to Check Available Memory in Ubuntu
Adobe FlashPlayer Emergency Group Policy | >_
The internet war on sex is here
Canada and France will explore AI ethics with an international panel
Reimaging an old X3-2/X4-2 ODA - Blog dbi services
Recovering from failed patch on virtualized ODA - Blog dbi services
5 mistakes you should avoid with Oracle Database Appliance - Blog dbi services
Patching a virtualized ODA to patch 12.2.1.4.0 - Blog dbi services
ODA and CIS / GDPR features - Blog dbi services
Oooooops or how to undelete a file on an ext4 filesystem - Blog dbi services
Red Hat’s David Egts: Agencies Should Screen Open Source Code for Cyber Risks | ExecutiveBiz
10 books to make you a stronger leader | The Enterprisers Project
Blueprint for a team with a DevOps mindset | Opensource.com
Home - OpenChain
2018-12: LXD, SSH Foo | KWLUG - Kitchener-Waterloo Linux User Group
IT Security Lessons from the Marriott Data Breach
Red Hat’s Enterprise Linux 7.5 Earns FIPS 140-2 Certification Renewal; Paul Smith Quoted – GovCon Wire
Teaching Cybersecurity Law and Policy: My Revised 62-Page Syllabus/Primer - Lawfare
Robert Chesney
Avoiding A World War Web: The Paris Call for Trust and Security in Cyberspace - Lawfare
Geoeconomics: the Chinese Strategy of Technological Advancement and Cybersecurity - Lawfare
AT&T is the first major US carrier to support eSIM on iPhone
Debugging MSSQL Connections from Ububtu | Connor Johnson
The perfect gift is cheap and easy ~ Get Rich Slowly
South Carolina: A Road Map For Tax Reform | Tax Foundation
Agile and Scrum Training: Gain Skill in Agile and Scrum Methodologies
Dependent Care FSA: Save on Daycare, Preschool, Summer Camps, After-School, and Elder Care — My Money Blog
DOAG 2018: OVM or KVM on ODA? - Blog dbi services
AWS re:invent 2018 – Day 3 - Blog dbi services
AWS re:Invent 2018 – Latest Announcements – Part II – Ather Beg’s Useful Thoughts
AWS re:Invent 2018 – Latest Announcements – Part I – Ather Beg’s Useful Thoughts
The Magic of the CCIE | The Networking Nerd
Dmitri Popov / momo · GitLab
Analyzing and reducing SystemTap's startup cost for scripts - RHD Blog
How to Set Up SSH Two Factor Authentication on Ubuntu 18.04, 18.10 Server
A Simple Way to Map Out Your Career Ambitions
Podman: A more secure way to run containers | Opensource.com
How to involve others in your professional goal setting | Opensource.com
Cacher - A Code Snippet Organizer for Pro Developers
Zim - a desktop wiki
Serverless Roadmap: Hosted and Installable Platforms - The New Stack
What 9 Cybersecurity Research Reports Show About the State of Risk
OpenBSD on a Laptop
Email Security & Privacy – Python Tips
How to Set up a Firewall for Redis using ufw | thisDaveJ
Get AD Schema Attribute Names | Alan's Blog
The Anniversary of the Monroe Doctrine - Lawfare
How to Access a Remote Server Using a Jump Host
Flush Wall-Mounted Raspberry Pi Touchscreen: 8 Steps (with Pictures)
Technology Radar | Emerging Tech Trends for 2018 | ThoughtWorks
Getting a list of all sites served by IIS > 40Fingers Websolutions
The Definitive T430 Modding Guide – George Kushnir (http://n4ru.it) – Medium
Latest Software Maintenance Script: Making WSUS Suck Slightly Less – Dam Good Admin
Huygens’ Ruler – Drawing Interference Patterns | Tinkerings
The Tax Benefits of Forming an S Corporation | Mad Fientist
Essential System Tools: Neofetch - System Information Tool written in Bash - LinuxLinks
Pandas Read CSV Tutorial
Neopythonic: What to do with your computer science career
Continuous Integration with Python: An Introduction – Real Python
Kubernetes for Python Developers: Part 1 | Celery how-tos and tutorials
Cybersecurity Threats Keep Evolving, Research Shows
Arch-Audit : A Tool To Check Vulnerable Packages In Arch Linux | 2daygeek.com
Everything You Need to Know about Containers, Part III: Orchestration with Kubernetes | Linux Journal
Google Faces GDPR Violation Complaints For Location Tracking
How to test your network with PerfSONAR | Opensource.com
A federal privacy draft bill could arrive in early 2019
US charges Iranian hackers over $30 million ransomware spree
Financial Freedom Is About Resilience to Outside Shocks — My Money Blog
Amazon’s next healthcare move is software that can mine medical records
Uber fined £385,000 in the UK for 2016 cyber-attack
Why Everyone Should Have Their Own Business (and How to Guarantee Success) | Mad Fientist
Why you should care about RISC-V - RHD Blog
The Morris Worm Turns 30
Home Assistant
Oracle Exploring DTrace With eBPF - Phoronix
How I uncovered my inner geek | Opensource.com
“That’s the open source way!” The Red Hat Sydney Forum Keynote - IT Brief Australia
DoS Vulnerabilities Found in Linux Kernel, Unpatched
Potentially disastrous Rowhammer bitflips can bypass ECC protections | Ars Technica
ECCploit
Vulnerability Mapping with Kali Linux
How to future-proof your IT job in the age of AI | The Enterprisers Project
Gaining eBPF vision: A new way to trace Linux filesystem disk requests
Pioneers in Open Source--Eren Niazi, Part II: the Untold Story | Linux Journal
Eren Niazi
Software Deployment Models - SFlanders
Installing & using Python virtualenv - OzNetNerd
From Physical To Virtual To Containers - SFlanders
VCDX – Defending a Bad Idea – vcdx133.com
VCDX – Levels and Focus – vcdx133.com
vSphere 6.7 Update Manager Tip #1 - VirtuallyInclined.com
Running VMware ESX Server 2.5 – Virtually Fun
My Markdown Journey – Network Inferno
Permissions and Vagrant VMware Utility – Network Inferno
Traffic Light Protocol alike Security Reference Architecture for Azure – Karim Vaes
Using Ansible to Run Powershell Scripts
Using Vagrant to Deploy an Ubuntu Server running KVM
Installing Host VIB's Using PowerCLI
Using Powershell to Create Windows SMB Shares
L1 Terminal Fault (L1TF) Patching Considerations
What's New in vSphere Virtual Hardware Version 14
Coming Soon – Snowball Edge with More Compute Power and a GPU | AWS News Blog
Reformat an Isilon node and try again! - FastStorage
How to expand a LUN on VNX using the CLI - 50mu - about storage
HOWTO: Force (really) WSUS Clients to Check in on Demand – Please Work
vuLnDAP - DigiNinja
SC - Threat Vulnerability Management Policy
Episode 115 - Discussion with Brian Hajost from SteelCloud
What are U.S. DoD 8140, 8570 and 8570.01-M and What Do They Mean for Your Career?
briantist (Brian Scholer) · GitHub
Install an SSL Certificate on a Ubiquiti EdgeMAX EdgeRouter
List installed Windows Updates using WMIC – Pario TechnoBlob
SIGHTINGS
SCCM Client Logs for Software Update Troubleshooting « The Tech L33T
Windows Server 2008 R2 Core: Introducing SCONFIG. | Virtualization Blog
SCCM 2012 R2: Where is the SMSTS.log located?
Top 10 Secure Coding Practices - CERT Secure Coding - Confluence
OSINT Tool Comparison Table - Google Sheets
Top 10 Web Hacking Techniques of 2017 | Blog
SYN Shop | 1075 American Pacific, Suite C, Henderson, NV 89074 | Monday - Friday 6pm - 10pm | Saturday 3pm - 10pm
PowerPoint Presentation - 76_1.pdf
Microsoft Word - MDIC CybersecurityReport.docx - MDIC-CybersecurityReport.pdf
PowerPoint Presentation - nist-cyber-security.pdf
Managing Medical Device Cybersecurity Vulnerabilities - HIMSS18_Managing-Medical-Device-Cybersecurity-Vulnerabilities.pdf
How to disable obsolete SSH cipher/ MAC algorithms - Airheads Community
The Shadowserver Foundation: NTP Version (Mode 6) Scanning Project
How to Make Lasagna-Stuffed Spaghetti Squash - Best Lasagna-Stuffed Spaghetti Squash -WomansDay.com
Behind the scenes with Linux containers | Opensource.com
My Experience Upgrading vCenter to 5.5 Update 3b – The Lowercase w
Unblock your downloaded files with a right-click and PowerShell - Syst & Deploy
Disk I/O | Performance Tuning on Linux
TeXConf 2018 – the meeting of the Japanese TeX Users – There and back again
PCI Compliance – Your First Three Steps to Compliance
Project Jupyter | Home
Flash HP 649281-B21 656089-001 to Mellanox Firmware | ServeTheHome and ServeThe.Biz Forums
GitHub - bbbrumley/portsmash
ERC Grant received by Billy Brumley – Warmest congratulations! | TUT Pervasive Computing Blog
Digital DASH – ICTC - Focus on Information Technology (FIT)
Configuration Manager 2012 Client Command List
Install 11g RAC on Linux -- PreInstallation tasks
SCCM Updates and Powershell - PerlStalker’s SysAdmin Notes
Run Notepad as Administrator to Avoid Access is Denied
Install and Configure Squid3 Caching Proxy on Debian Wheezy | LuvUnix
GS1 UK | Product identifiers
GS1 identification keys - Standards | GS1
Top 10 reasons why your Enterprise Java Application is slow - Karunsubramanian.com
Beat the Auditors, Be One Step Ahead with PowerShell – Hey, Scripting Guy! Blog
Ultimate Library of ICS Cyber Security Resources - SCADAhacker
OpenVAS | Eikonal Blog
Georgia Agencies Covered by Cyber Insurance | Annual State IT Report
toolswatch (NJ. Ouchn) · GitHub
Passwords & Yubikey
ISM - Information Security Manual - Australian Cyber Security Centre (ACSC)
SecPod SCAP Repo, a repository of SCAP Content (CVE, CCE, CPE, CWE, OVAL and XCCDF)
SetUserFTA: UserChoice Hash defeated – Set File Type Associations per User or Group on Windows 8/10 and 2012/2016/2019 – the kolbicz blog
Firmware Security – Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Thoughts On The NTIA Software Component Transparency Meeting
Cybersecurity and Healthcare – Controls, Plans, and Board Preparation - YouTube
Cybersecurity and Healthcare – Trends, Challenges, and Evolving Threats - YouTube
(115) Cybersecurity and Healthcare – Terminologies, Breaches, and Threats - YouTube
On Cross-Site Scripting and Content Security Policy
quentinhardy (bobsecq) · GitHub
eDEX-UI: A Fully Functioning Sci-Fi Computer Interface Inspired By TRON Legacy - Linux Uprising Blog
eDEX-UI
Deploying a Honeypot on AWS – Steve Gathof – Medium
Introduction to T-Pot - The all in one honeypot
Communities of practice - The_Open_Source_Way
Communities of Practice (Lave and Wenger) - Learning Theories
Introduction to communities of practice | Wenger-Trayner
CHAP12HOADLEY.pdf
Errata Security: Masscan as a lesson in TCP/IP
The Illustrated TLS 1.3 Connection: Every Byte Explained
Security Database
GitHub - BrianWGray/nexpose: generic scripts for managing nexpose
shouldersofinfosec [licensed for non-commercial use only] / The Shoulders of InfoSec Project
Groups - MITRE ATT&CK™
Incident Management
1 - Incident_Management Document - Version 1.pdf
Incident Management and Response
Telecom incident management controls by COBIT 5
Identity 3.0 - Principles - Identity_3.0_Principles_v1.1.pdf
Jericho Forum - Wikipedia
How to Download and Install RHEL8 Beta For Free (Red Hat Enterprise Linux)
The SEC and Cybersecurity Regulation - Lawfare
Four Short Links - O'Reilly Media
Ευάγγελος Μπαλάσκας - Cloud-init with CentOS 7 » Evaggelos Balaskas - System Engineer
Strange interstellar object 'Oumuamua is tiny and very reflective
'Oumuamua
15 Best Security Tools You Should Have on Linux
Sam Altman - Startup Investor School Day Notes - NevBlog
How to retire early ~ Get Rich Slowly
Fiology: The online encyclopedia of financial independence
Diagnosing a Mac which can’t complete booting – The Eclectic Light Company
Why endpoint management is critical to your enterprise security strategy
Could your brain be a target for hackers?
Cybersecurity Threat Intelligence, Phishing Protection, Alerts
Boards have wider cyber security awareness but still struggle to manage risks
Misconfigurations put enterprise cloud data at risk
Cloudflare + Terraform DNS Records – Geek and I
Enterprises face more than 100 critical vulnerabilities per day
Enterprises identify 870 unique vulnerabilities on their systems every day, on average. Of those, more than 100 are rated as critical on the common vulnerability scoring system (CVSS) according to a new report.
95 percent of IT security professionals underestimate phishing risks
Phishing is at the start of 90% of successful breaches
Vulnerability Intelligence Report | Tenable®
Organizations find cloud costs higher than anticipated
Automatic Ripping Machine | Headless | Blu-Ray/DVD/CD | b3n.org
“AaronLocker” update (v0.91) — and see “AaronLocker” in action on Channel 9! – Aaron Margosis' Non-Admin, App-Compat and Sysinternals WebLog
Extracting SQL Queries from .NET Apps with WinDbg | chentiangemalc
Windows Server DHCP Failover | PeteNetLive
This is Not Fine! - The IT Hollow
Transition to a big tech company. Part 2 (Lessons Learned) - The Matrix has you...
How to Prepare for Your Next Network War Room Debate - Part 2 | APMdigest - Application Performance Management
How to Prepare for Your Next Network War Room Debate - Part 1 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 5 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 4 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 3 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 2 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 1 | APMdigest - Application Performance Management
Agile Procurement | The IT Skeptic
Microsoft Teams PowerShell: Getting All Teams, Changing Team Settings and Adding and Removing Users from Teams - Tom Talks
Quality Checking Infrastructure-as-Code - The IT Hollow
This is Not Fine! - The IT Hollow
Everything You Need to Know To Understand AI - Kossboss
ESXi 6.0 to 6.5 Upgrade – Stuff I'm Up To
Surviving a layoff with a generative culture - SysAdmin1138 Expounds
LINUX - How to clone a disk with ddrescue - gnu ddrescue also known as gddrescue - the better ddrescue tool - Kossboss
Bob Kahn Net Worth and Wiki - Kossboss
How to block executables from APPDATA – MILOSZENGEL.com
Deploy an Enterprise Grade Network in the Home for Less than $500 – Mike F Robbins
Use PowerShell to Monitor IIS Websites and Application Pools – Mike F Robbins
Building a Golden Image Pipeline
Chris's Wiki :: blog/spam/DKIMIncomingMailStats-2018-10
PowerShell Tip: Parse a date inside a string - LazyWinAdmin
Windows 7: CBS.log bug can fill your system drive | Born's Tech and Windows World
Windows Defender Is The First Antivirus To Run Inside Sandbox: Here's How To Enable It
Automate a web browser with Selenium - Fedora Magazine
My Favorites |
2018-11: Website Security | KWLUG - Kitchener-Waterloo Linux User Group
Episode 6: Conferences and Community | Linux Journal
The Death of Cyber Utopia - Lawfare
How to Install TIG Stack (Telegraf, InfluxDB, and Grafana) on Ubuntu 18.04 LTS
A Simple Linux KVM Backup Framework using NetWorker – Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
Worth Reading: Notes on Distributed Systems « ipSpace.net blog
Notes on Distributed Systems for Young Bloods – Something Similar
FAA Part 107 Certification - Mostly NetworksMostly Networks
Upgrade ESXi To The Latest Version Without Any Software Download | ESX Virtualization
Extract DNS Records to CSV with PowerShell | chentiangemalc
Export OU Structure To Image with PowerShell | chentiangemalc
Cisco CyberOps CCNA #CyberOps #CCNA #Security #CyberSecurity -
Will We Ever Talk Openly About Income and Money? — My Money Blog
Best Practices for Running SQL Server on vSphere
AWS Serverless Application Model (SAM) Command Line Interface – Build, Test, and Debug Serverless Apps Locally | AWS News Blog
CLTC Launches Cybersecurity “Citizen Clinic” - CLTC
10 Useful LibreOffice Tips to Boost Your Productivity
How to properly deactivate a user in Office 365 and SharePoint - SharePoint Maven
TrueCrypt is dead, long live VeraCrypt
Monitoring database health and behavior: Which metrics matter? | Opensource.com
Your First Java Program in the Ubuntu Terminal
How to install and run the Maltrail detection system on Ubuntu Server 18.04 - TechRepublic
HiDPI on dual 4K monitors with Linux | Vincent Bernat
Oracle Moves to Gen 2 Cloud, Promising More Automation and Security
Bridging State-level Cybersecurity Resources - Lawfare
A Deepening U.S.-China Cybersecurity Dilemma - Lawfare
City lights - Japan Today
Why Do Some Schools Ban Halloween? - Law and Daily Life
Over the rainbow - Japan Today
How to Prepare Your Money for the Coming Economic Slowdown
How to configure PXE network booting for Kali Linux | Sebastian Neef - 0day.work
Press Announcements > Statement from FDA Commissioner Scott Gottlieb, M.D. on FDA’s efforts to strengthen the agency’s medical device cybersecurity program as part of its mission to protect patients
New libssh Vulnerability – No Logo But Plenty Of Attention
Automatically splitting, cropping and rotating multiple photos from a combined scan | stewart a.
My Money Blog Portfolio Income – October 2018 — My Money Blog
Michael Pollan says that you can sum up his eating advice as “Eat food, not too much, mostly plants.” You can sum up my thoughts on portfolio income as “Spend mostly dividends and interest. Don’t eat too much principal.”
NBlog - the NoticeBored blog: NBlog Oct 13 - little boxes, little boxes
NBlog - the NoticeBored blog: NBlog Oct 9 - ten top infosec books
Supply Chain Security 101: An Expert’s View — Krebs on Security
How Office 365 learned to reel in phish - Microsoft Secure
CISO series: Building a security-minded culture starts with talking to business managers - Microsoft Secure
Pentest-Machine - Automates Some Pentest Jobs Via Nmap Xml File - KitPloit - PenTest Tools for your Security Arsenal ☣
CT-Exposer - An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs - KitPloit - PenTest Tools for your Security Arsenal ☣
Survey: 75 percent of US employees display insufficient cyber knowledge
Perspective: The periodic table of data privacy
Sen. Warner discusses America's failure to lead in cybersecurity
UK Cyberattack Investigations: An Analysis - HealthcareInfoSecurity
Meterpreter File System Commands Cheatsheet
HHS Updates Security Risk Assessment Tool - HealthcareInfoSecurity
From Canada to Argentina, Security Researchers Have Rights—Our New Report | Electronic Frontier Foundation
Google Online Security Blog: Modernizing Transport Security
Errata Security: Notes on the UK IoT cybersec "Code of Practice"
Maintaining a Pulse: Ransomware in the Healthcare Sector - The Ethical Hacker Network
FICO & US Chamber of Commerce Score Cyber-Risk ...
SEC Warns Public Companies on Accounting Control Use
The Cybersecurity Hiring Gap is Due to The Lack of Entry-level Positions - Daniel Miessler
6 Reasons Why Employees Violate Security Policies
Medical Device Security and CIO Insomnia ~ Cyber Thoughts
Ransomware attack hit North Carolina water utility following hurricane | CSO Online
The Cybersecurity Culture Gap
ERP Applications Under Fire Report | Onapsis
NVMe: A cheat sheet - TechRepublic
Open Source Healthcare | opensourcehealthcare
Raspberry Pi based garden monitoring system supplies five sensors
Microsoft browsers will disable 20-year-old security protocol
MIT's AI can identify breast cancer risk as reliably as a radiologist
Proposal for a Cyber-International Committee of the Red Cross - Lawfare
Summary: GAO Report on Weapons System Cybersecurity - Lawfare
Free NFR Keys for KMS from Hytrust for all VMware vExperts | ESX Virtualization
VMware vSphere 6.5 - VM Encryption Details | ESX Virtualization
draft-ietf-opsec-v6-13 - Operational Security Considerations for IPv6 Networks
CCNA Training » AAA TACACS+ and RADIUS Tutorial
To which release should you upgrade to? Plus: Extended Support?
Yes, SQL*Loader is Faster at Loading Records | ThatJeffSmith
Modeling JSON in Oracle Database Tables, Part 2 | ThatJeffSmith
New – Managed Databases for Amazon Lightsail | AWS News Blog
My Top 10 PowerShell Tips & Tricks – Virtually Sober
Free Tool - HammerDB Benchmark Tool New Release | ESX Virtualization
IAM Identities Basics and Best Practices
AWS IAM Policy Explained
Amazon S3 Security Part 1: S3 Access Control Tools
Getting started with Red Hat Satellite – Initial configuration - Blog dbi services
Google AI can spot advanced breast cancer more effectively than humans
FOSS LinuxBoot replaces UEFI on servers | Born's Tech and Windows World
WannaCry Ransomware attack costs £92 million - IT Governance Blog
The most recent Servicing Stack Updates @ AskWoody
Swap Digger - Tool That Automates Swap Extraction And Searches For Linux User Credentials, Web Forms Credentials, Web Forms Emails, Http Basic Authentication, Wifi SSID And Keys, Etc - KitPloit - PenTest Tools for your Security Arsenal ☣
Report: Remote Access Is No. 1 Healthcare Tech Hazard
Live Webinar: Five Steps to Masterminding an Effective Security Awareness ProgramWebinar.
US Senators ask India's PM to rethink strict data localization plans
VCDX - Mock Design - How to attack it?! -
Medtronic Cardiac Devices Recalled Due to Cyber Concerns
The Feet of the Masters: Lessons on Irregular Cyber Warfare | Small Wars Journal
Getting started with Red Hat Satellite - Installation - Blog dbi services
How to do great work ~ Get Rich Slowly
Security Is Bananas | The Networking Nerd
Getting started with Minikube: Kubernetes on your laptop | Opensource.com
Doc Searls Weblog · Toward no longer running naked through the digital world
What is the latest version of Wi-Fi? – lakkireddymadhu
The cost of a data breach - IT Governance Blog
How Cyber Essentials can help secure your devices and software - IT Governance Blog
5 alerting and visualization tools for sysadmins | Opensource.com
From DNSAdmins to Domain Admin, When DNSAdmins is More than Just DNS Administration – Active Directory Security
HHS OIG Launches Cybersecurity Web Page - HealthcareInfoSecurity
Hardware, firmware and drivers | Adventures in a Virtual World
Life is dirty. So is your data. Get used to it. - Thomas LaRock
Ransomware: Keep Safe and Stay Safe
Understanding the privacy paradox
NIST and the Small Business: Addressing Cyber Insecurity
Top cybersecurity facts, figures and statistics for 2018 | CSO Online
CCNA Training » OSI TCP/IP Model Questions
Counterintelligence Implications of Artificial Intelligence—Part III - Lawfare
Artificial Intelligence – A Counterintelligence Perspective: Part I - Lawfare
(My) BruCON 2018 Notes – Adventures in the programming jungle
CCNA Training » Basic MPLS Tutorial
PiCluster 2.4 is out! | Linux-toys.com
Linus' Behavior and the Kernel Development Community | Linux Journal
Sell Me on Oracle SQLcl in 50 Seconds | ThatJeffSmith
Report: US weapons systems are highly vulnerable to cyber attacks
CTIA - Wireless Industry Announces New Cybersecurity Certification Program for Cellular-Connected IoT Devices
Apache Struts v3 - Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts - KitPloit - PenTest Tools for your Security Arsenal ☣
Crypton - Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms - KitPloit - PenTest Tools for your Security Arsenal ☣
Laforge - Security Competition Infrastructure Automation Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
How to Protect Against Software Supply Chain Attacks | OPSWAT
The Why of Security | The Networking Nerd
Mail Security Tester - A Testing Framework For Mail Security And Filtering Solutions - KitPloit - PenTest Tools for your Security Arsenal ☣
NTT Data plans to develop AI-backed diagnosis service globally - Japan Today
How to Change/Spoof a MAC Address in Ubuntu
20 Red Hat Clustering (Pacemaker) Interview Questions and Answers
Starting Points & Ideas for your Arduino STEM Curriculum | Underwater Arduino Data Loggers
USBHarpoon a look-like charging cable that can hack into your computerSecurity Affairs
USBHarpoon
Colection of Opensource Project – it…'s Notes
50 Funny Wi-Fi Names for Your Router's Network SSID
How to report a data breach to the ICO - IT Governance Blog
Vizio to pay $17M to settle privacy class-action
GAO Report shed the lights on the failures behind the Equifax hackSecurity Affairs
Embracing Cybersecurity Best Practices, No Matter Where You Are
7 Steps to Start Your Risk Assessment
(My) BruCON 2018 Notes (Retro Day) – Adventures in the programming jungle
6 ways your organisation can suffer a data breach – IT Governance Blog
Zero Trust Security Architectures - Akamai's Approach - Security Boulevard
Seven Signs of a Strong Security Culture - Security Boulevard
From my Gartner Blog - Endpoint Has Won, Why Bother With NTA? - Security Boulevard
The Origin of Ransomware and Its Impact on Businesses | Radware Blog
Vulnerability Scanning vs. Penetration Testing: What's the Difference?
OWASP Top 10 Security Risks – Part I - Security Boulevard
Health Data Breach Victim Tally for 2018 Soars
6 Ways to Use CloudTrail to Improve AWS Security
Active Directory Security Risk Factors and What to Do About Them (Part 2) | Security Architects Partners
Active Directory Security Risk Factors and What to Do About Them (Part 1) | Security Architects Partners
Open FAIR Complements Risk Management Programs | Security Architects Partners
Equifax Breach: Key Lessons Learned - HealthcareInfoSecurity
Breach Notification: Canada Prepares for Nov. 1
The FDA’s New Digital Health Cyber Unit: What Would It Do?
Facebook Submits GDPR Breach Notification to Irish Watchdog
FDA Reveals Steps to Bolster Medical Device Cybersecurity
Critical Elements of a Solid Cybersecurity Program
Responding to Ransomware Attacks: Critical Elements
The SQL Server Defensive Dozen Part 1 – Hardening SQL Network Components – SQL Server Cybersecurity
The SQL Server Defensive Dozen – Part 3: Authentication and Authorization in SQL Server – SQL Server Cybersecurity
Measuring Model Goodness – Part 1 | Developing Analytics Solutions with the Data & AI Global Practice
Add a Staff Notebook to Microsoft Teams – SharePoint Steve
Long Before Facebook, The KGB Spread Fake News About AIDS : NPR
Reality Winner Sentenced To 5 Years, 3 Months For Leaking Classified Info : NPR
Getting Over Your Ex: Can Brain Science Help Heartbreak? : Shots - Health News : NPR
USB threats from malware to miners - Securelist
DeepSec 2018 Talk: Uncovering Vulnerabilities in Secure Coding Guidelines - Fernando Arnaboldi •
ABC Film Crews Leave Hospitals on the Hook for HIPAA Fines
Unsecure RDP Connections are a Widespread Security Failure | Webroot
Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV - Microsoft Secure
GDPR Report Card: Some Early Gains but More Work Ahead
Securing connected medical devices: Will categorizing them as ICS help? | CSO Online
Mobile CI/CD 101 – Visual Studio App Center Blog
2018 State of DevOps Report
U.S. Air Force awards $30M+ Enterprise IT-as-a-Service contract to Microsoft – Microsoft Azure Government
Design considerations for hybrid applications – Security – AzureCAT Guidance
Microsoft Security Code Analysis (Private Preview) – Microsoft Faculty Connection
Secure development on Azure Government – Part 1 – Microsoft Azure Government
Real-time performance monitoring for Azure SQL Database Managed Instance | SQL Server Customer Advisory Team
Sans Forgetica: the font that could help you remember
Why You Shouldn't Discount Discount Cloud Services Part 2 | Tallan's Blog
SNIP 5 - HIPAA External Code Set Testing | Tallan's Blog
All sorts of bad things happen when we disable the Task Scheduler service, is that bad? – The Old New Thing
What Is "Five Eyes" Surveillance? VPN Users, Beware!
How one student’s open source journey lead her to help create ChRIS
Why TENS is the secure bootable Linux you need - TechRepublic
Key Takeaways from Business of Software USA 2018
China reportedly carried out a 'hardware hack' on Apple and Amazon
Publish or Perish: The Sad Genius of Ignaz Semmelweis | Hackaday
Ignaz Semmelweis
How to monitor your data center Linux server with osquery - TechRepublic
How to measure DevOps success | Opensource.com
Intro to Docker: Why and How to Use Containers on Any System | Hackaday
The DIN Rail and How It Got That Way | Hackaday
DSHR's Blog: Brief Talk At Internet Archive Event
Low-cost USB Rubber Ducky pen-test tool for $3 using Digispark and Duck2Spark
Exploring an Abandoned Toys “R” Us | Hackaday
Hack My House: Raspberry Pi as Infrastructure | Hackaday
Sea of red - Japan Today
Terence Luk: Attempting to boot a VMware vSphere virtual machine fails with the error status: 0xc0000017
0xc0000017
Leaf-and-Spine Fabric Myths (Part 1) « ipSpace.net blog
Passed Microsoft Certified: Azure Administrator - Thomas Maurer
How Etsy Handles Peeking in A/B Testing - Code as Craft
Why privacy compliance matters to a company’s valuation
What might a GDPR cease-processing order look like?
Under GDPR, large-scale data processing is considered ‘high risk’
Drafting a GDPR-compliant retention policy
Spain's decree-law temporarily adapting legislation to GDPR
Italy's GDPR implementation law goes into effect today
What could Canada learn from the GDPR?
How local laws helped a company prepare for GDPR
A practitioner's look at Belgium's GDPR implementation law
CNIL looks at GDPR four months later
Security incident involved in SingHealth data breach never reported
Study: Health care data breaches rising yearly
Medical Device Cybersecurity: Regional Incident Preparedness and Response Playbook - pr-18-1550-Medical-Device-Cybersecurity-Playbook.pdf
Alabama Gov. Kay Ivey announces state's first security operations center
Calif. signs first IoT security bill into law
AT&T CEO calls for federal US privacy law
Victory! California Passes Net Neutrality Bill | Electronic Frontier Foundation
8 Attack Vectors Puncturing Cloud Environments
Vermont’s New Data Privacy Law | Electronic Frontier Foundation
Owning Security in the Industrial Internet of Things
The Cyber Kill Chain Gets a Makeover
6 Security Training Hacks to Increase Cyber IQ Org-Wide
Troy Hunt: New Pluralsight Course: Adapting to the New Normal: Embracing a Security Culture of Continual Change
Managing Data the Way We Manage Money
4 Traits of a Cyber-Resilient Culture
CISOs: How to Answer the 5 Questions Boards Will ...
New Book: The Culture of Learning | Don Jones
DSHR's Blog: Vint Cerf on Traceability
Robert Milkowski's blog: Solaris: Spectre v2 & Meltdown fixes
History of Lisp | Lambda the Ultimate
AMA: How can I start using .NET Framework in PowerShell? | Don Jones
Upcoming Webinar: A Farewell to LUNs – Discover how VVols forever changes storage in vSphere » Welcome to vSphere-land!
CVE Funding and Process | Emergent Chaos
Ease Me Into Cryptography Part 1: Buzzwords and Hash Function - The Ethical Hacker Network
Container Security Part 3 – Kubernetes Cheat Sheet - The Ethical Hacker Network
DoD RMF Part 1: How We Got to the RMF - The Ethical Hacker Network
Panaceas, Shiny Objects and the Importance of Managing Risk in a Healthcare Environment – Part 2 ~ Cyber Thoughts
Patient Safety and Cyber Risk ~ Cyber Thoughts
Preparing to Release the OWASP IoT Top 10 2018 - Daniel Miessler
The Sony hacker indictment: 5 lessons for IT security | CSO Online
Facebook security and privacy issues revealed | CSO Online
The best password advice right now | CSO Online
Basic Cyber Hygiene Practices That Go a Long Way | CSO Online
Gwinnett Medical Center investigating possible data breach | CSO Online
David Chung's SDDC in a box uses 4 Xeon D nodes for vSAN, is relatively quiet, and fits in carry-on! | TinkerTry IT @ Home
Violin Systems Announces Violin XVS 8 | PenguinPunk.net
Ansible - Don't be Afraid of a Little Python · Lindsay Hill
Testing Performance on vSAN — ThinkCharles.net
Now Available – Amazon EC2 High Memory Instances with 6, 9, and 12 TB of Memory, Perfect for SAP HANA | AWS News Blog
New Oracle Database Upgrade Lab for Oracle 18.3.0
Swap space on Linux systems: A primer | Opensource.com
iTWire - Equifax penalised $3.5m for consumer law breaches
What's Your System's Uptime? | Linux Journal
Computer Science (CS) and Information Technology (IT): Part 2 | APMdigest - Application Performance Management
Computer Science (CS) and Information Technology (IT): Part 1 | APMdigest - Application Performance Management
Four best practices that can ensure application health in an Hybrid IT environment! (by Will Moonen)
Windows Server 2019 Windows Defender Advanced Threat Protection - Thomas Maurer
GitHub - carlbuchmann/iac-dev: Infrastructure as Code development Workstation: RedHat/Centos or Debian/Ubuntu
The 2018 DOD Cyber Strategy: Understanding 'Defense Forward' in Light of the NDAA and PPD-20 Changes - Lawfare
Windows ALPC vulnerability (CVE-2018-8440) used in Exploit Kit | Born's Tech and Windows World
16 iptables tips and tricks for sysadmins | Opensource.com
Patch Lady – 31 days of paranoia – day 1 @ AskWoody
October the 1st, a historic day | Born's Tech and Windows World
Windows Server 2019 Evaluation and Security Baseline Draft | Born's Tech and Windows World
A new triple constraint – Blog FiascoBlog Fiasco
Essential System Tools: ps_mem - accurately report memory usage of programs - LinuxLinks
Open-source alt-droid wants to know if it's still leaking data to Google • The Register
Download our GIMP cheat sheet | Opensource.com
Siemens Issues An Oktoberfest Release Of Jailhouse 0.10 Hypervisor - Phoronix
A Fond Farewell and Tribute to Former Low End Mac Writer Charles W. Moore | Low End Mac
Announcing Oracle Solaris 11.4 SRU1 | Oracle Solaris Blog
3 open source distributed tracing tools | Opensource.com
Low cost and open source Serial to Ethernet WIZ750SR, WIZ752SR Series | Elektor Magazine
Why Nerds Use Linux - LinuxAndUbuntu - Linux News | FOSS Reviews | Linux Tutorials HowTo
Aging like milk, not wine: The realities of container security
What containers can teach us about DevOps | Opensource.com
DHS Awards GrammaTech $3.5M to Modernize Open-Source Software Analysis Tools
The rise of open source use across state and local government -- GCN
Open Source Software & Usability: Open source tools I used to write my latest book
webhint: a hinting engine for the web – webhint – Medium
Cybersecurity Remains an Uphill Battle, New Research Shows
The 10,000 Hour Rule Is Wrong. How to Really Master a Skill
Millions of unfixed security flaws is a lie – Open Source Security
How to install SOPlanning on Ubuntu 18.04 LTS
Understanding Bash: Elements of Programming | Linux Journal
How Azure Sphere ensures IoT security within a 4MB Linux stack
Weekend Reading: Containers | Linux Journal
Taskbook - Command Line-Based Tasks, Boards, and Notes
French cybersecurity agency open sources security hardened CLIP OS - Help Net Security
How to Test Network Throughput Using iperf3 Tool in Linux
Oracle Launches Java 11, Adding Security Features
List of 80,000 Hours content from the last 4 months, summary of which were most popular, and plans for future releases. - 80,000 Hours
10 handy Bash aliases for Linux | Opensource.com
10 Body Language Mistakes That Sabotage Job Interviews
Infographic: Average Auto Insurance Premiums For All 50 States — My Money Blog
The history of VMware vSphere | VM Spot
Security Features Check – AMTSO
EICAR – The Most Common False Positive in the World | Webroot
Credit Freezes are Free: Let the Ice Age Begin — Krebs on Security
From Kekeo to Rubeus – harmj0y
CVE-2018-5240 – Symantec Management Agent (Altiris) Privilege Escalation
Multiple Ways to Secure SSH Port
JPCERT/CC Blog: Visualise Sysmon Logs and Detect Suspicious Device Behaviour -SysmonSearch-
How to Install and Configure Apache Tomcat 9 in CentOS
Evil Tester: What If Courage was Contagious?
My Experience with the DoD Version of the RMF - The Ethical Hacker Network
Hunting for Suspicious Processes with OSSEC - SANS Internet Storm Center
ModSecurity and nginx | Linux Journal
Security Flaw Found In Microsoft JET Database Engine by ZDE - Patch Expected In Windows October Update - Appuals.com
Configuring Name Protection on a DHCP Server to Prevent Name Squatting | Alexander's Blog
6 steps for building a robust incident response plan | CSO Online
5 cyber security basics you can't afford to ignore | CSO Online
Panaceas, Shiny Objects and the Importance of Managing Risk in a Healthcare Environment – Part 1 ~ Cyber Thoughts
(My) OWASP Belgium Chapter meeting notes – Adventures in the programming jungle
New – Parallel Query for Amazon Aurora | AWS News Blog
Postman is Awesome – Stuff I'm Up To
The Cause of Every Deadlock in SQL Server - Thomas LaRock
Apache NiFi: From Syslog to Elasticsearch – David Vassallo's Blog
The top cybersecurity concerns for IT and business
Cisco Firewall Port Forwarding | PeteNetLive
Four Things to Consider Before You Move Everything to the Cloud (by Keith Bromley)
Kubernetes Network Policies Using Cilium - Controlling Ingress/Egress from Namespaces — Cilium
Identity Management for Systems in a DMZ
Linking Docker containers | geekdudes
Equifax One Year Later: What Lessons Have Been Learned?
GAO-18-559, DATA PROTECTION: Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach - 694158.pdf
How to Create Python Virtual Environments on Ubuntu 18.04 | Linuxize
State Department Still Sucks At Basic Cybersecurity And Senators Want To Know Why | Techdirt
Writing More Compact Bash Code | Linux Journal
Distributed tracing in a microservices world | Opensource.com
Linux firewalls: What you need to know about iptables and firewalld | Opensource.com
16 Useful Bandwidth Monitoring Tools to Analyze Network Usage in Linux
Oracle 12.2 : Windows Virtual Account - Blog dbi services
Weekend Reading: Scary Tales from the Server Room | Linux Journal
How To Enable TLS 1.3 in Nginx on Ubuntu 18.04 and 16.04 - LinuxBabe
A Detailed Look at RFC 8446 (a.k.a. TLS 1.3)
New Xbash Malware Is A Deadly Combo Of Ransomware, Botnet, Cryptominer
Creating a custom Windows image for MaaS – Azure Field Notes Blog
Openshift 3.5 installation headaches (and where to find the aspirin) – Azure Field Notes Blog
National Cyber Strategy
The Pentagon’s New Cyber Strategy: Defend Forward - Lawfare
How to Use Get-Log for Parsing Logs
Not all PowerShell shells are equals | >_
New – AWS Storage Gateway Hardware Appliance | AWS News Blog
The Economics of Stock Buybacks | Tax Foundation
EternalBlue Infections Persist
EternalBlue
The 7 Habits of Highly Effective Security Teams
New GandCrab ransomware variant hammers Florida school district | CSO Online
GandCrab
5 steps to create a zero trust security model | CSO Online
Hardening Windows – Stuff I'm Up To
Offline Update Page Details (Nessus)
Wholesale domain names, SSL Certificates, Hosted Email - OpenSRS
Have Microsoft patches reached a painful tipping point?
Blog, Hacking NASL Scripts- DigiNinja
GitHub - tenable/notepadpp-nasl
GitHub - tenable/nasldoc: A documentation generator for NASL.
Fast comparison of Nessus and OpenVAS knowledge bases | Alexander V. Leonov
PCI DSS: Lessons to learn from recent payment card breaches – IT Governance Blog
Errata Security: Provisioning a headless Raspberry Pi
Errata Security: California's bad IoT law
Installing OpenVAS on CentOS 7 - Linux Included
Experts Urge Rapid Patching of ‘Struts’ Bug — Krebs on Security
An Open Letter To Ransomware Authors - Linux Included
Presentation - HL7 Insecurities - Linux Included
Container Security Part 2 - Benchmarks to the Rescue - The Ethical Hacker Network
Automating DAST Scans with Jenkins, Arachni & ThreadFix - Sustainable Application SecuritySustainable Application Security
Globbing and Regex: So Similar, So Different | Linux Journal
WPScan - A Black Box WordPress Vulnerability Scanner
Lync Troubleshooting: There was a problem acquiring a personal certificate required to sign in. If the problem continues, please contact your support team. - TechNet Articles - United States (English) - TechNet Wiki
Rediscovering F-Droid – Exotic Security
What is DNS and how it works – lakkireddymadhu
DNS Terminology – lakkireddymadhu
Developing Cyber Security Incident Response Plans for Industrial Control Systems - Delta Risk
How Technology Increases Production Without the Need for Humans - Daniel Miessler
Stop Trying to Violently Separate Privacy and Security - Daniel Miessler
Stop Unwanted and Annoying Phone Calls | Verizon Phone Support
Habits of a Successful Business Executive that You Must Know
How I Reduced My Spam Phone Calls by 90% - Daniel Miessler
7 Trends in Docker Container Monitoring | APMdigest - Application Performance Management
The One Thing Destroying Office 365 Deployments - and How to Fix It - Part 2 | APMdigest - Application Performance Management
The One Thing Destroying Office 365 Deployments - and How to Fix It - Part 1 | APMdigest - Application Performance Management
I Lost 50 pounds in 5 Months, Here’s How - Thomas LaRock
FAQs for VeriSM | Purple Griffon
10 reasons to take your ITIL training now rather | Purple Gr...
ITIL4® - what’s happening, what’s new and what w | Purple Gr...
The No Budget Admin: De-Mystifying and Installing Orace Java for Linux
How I Tricked Myself into Shipping Too Late - mtlynch.io
Keeping a particular version of a package in Red Hat Enterprise Linux | setaOffice
MPECS Inc. Blog: Security: RBC Royal Bank: Best laid plans of mice and men
MPECS Inc. Blog: Legacy Windows XP for Industrial Machine Access and Management and Accounting Apps
List Global Assembly Cache using PowerShell – PowerShell, Programming and DevOps
2018 DerbyCon Hiring List ·
Powershell and Lotus Notes pt2 – Luka Gros
Mapping Network Security Resilience To The NIST Cybersecurity Framework (by Keith Bromley)
Startup Dreams (by Paul W. Smith)
“passionate stranger who hallucinates the future for them.”
Troubleshooting a Spotty/Bad Internet Connection (by Chris Greer)
PingPlotter
Need to document your environment? Check out “As Built Report” | JonKensy.com
Create Haskintos USB – it…'s Notes
Using VDO on CentOS/RHEL7 for Storage Efficiency | hobo.house
Bristol Airport affected by ransomware | Born's Tech and Windows World
Chris's Wiki :: blog/solaris/ZFSSendRecvVsRsync
Chris's Wiki :: blog/sysadmin/ProcmailWhatNext
The History of a Security Hole | OS/2 Museum
insignary
The new Windows lifecycle fact sheet @ AskWoody
Cross-Cloud Snapshot Management – Data Protection Hub
California Eyes Questionable Legislation In Bid To Fix The Internet Of Broken Things | Techdirt
The Enemy Gets a Vote - Lawfare
A Matter of Perspective | The Networking Nerd
Agile project management: A comprehensive guide | CIO
The principles of agile There are 12 key principles that still guide agile project management today. Customer satisfaction is always the highest priority and is achieved through rapid and continuous delivery. Changing environments are embraced at any stage of the process to provide the customer with a competitive advantage. A product or service is delivered with higher frequency. Stakeholders and developers collaborate closely on a daily basis. All stakeholders and team members remain motivated for optimal project outcomes, while teams are provided with all the necessary tools and support, and are trusted to accomplish project goals. Face-to-face meetings are deemed the most efficient and effective format for project success. A final working product is the ultimate measure of success. Sustainable development is accomplished through agile processes whereby development teams and stakeholders are able to maintain a constant and ongoing pace. Agility is enhanced through a continuous focus on technical excellence and proper design. Simplicity is an essential element. Self-organizing teams are most likely to develop the best architectures and designs and to meet requirements. Regular intervals are used by teams to improve efficiency through fine-tuning behaviors.
Text-editor-like weekly planner - Coypu
Oracle Core Audit - Do you Audit your Core database engine for breach?
Jaffar's (Mr RAC) Oracle blog: All about 'Autonomous Transaction Processing' - Part I
A Review of Ubiquiti Wireless | The Networking Nerd
Open-source software may aid brain imaging to find disease treatments | Health Data Management
Injecting chaos experiments into security log pipelines | Opensource.com
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
Encrypt A Drive With VeraCrypt in Linux - LinuxConfig.org
Top 8 YUM ThirdParty Repositories for CentOS and RHEL
Useful Tips to Improve Emulation Performance in RetroPie - Make Tech Easier
RetroPie
A day in the life of a log message | Opensource.com
the xonsh shell — xonsh 0.7.8 documentation
Tanium - Endpoint Security and Systems Management
How a Unique Business Model and Hiring Strategy Brought the Garrett Companies to $82 Million in Just 3 Years | Inc.com
Linux namei Command Tutorial for Beginners (5 Examples)
Introduction to python web scraping and the Beautiful Soup library - LinuxConfig.org
Know Your Storage: Block, File & Object | Linux.com | The source for Linux information
2 Ways to Re-run Last Executed Commands in Linux
DSHR's Blog: What Does Data "Durability" Mean
Slideshows - Dark Reading
Randomize your MAC address using NetworkManager - Fedora Magazine
Doing One Thing, Well: The UNIX Philosophy | Hackaday
Stop Killing Your Cattle: Server Infrastructure Advice | Linux Journal
12 Practical Ping Command Examples for Linux Users
The Cyberlaw Podcast: Click Here to Kill Everybody - Lawfare
Introduction to VistA | OSEHRA
Restoring 1000’s of SQL Server Databases Using PowerShell | Simon Osborne's SQL Blog
Deploy vCenter Server using Ansible - Virtual Elephant
How to Setup File Integrity Monitoring (FIM) using osquery on Linux
10 Must-See Museums in the U.S.
CYBER CENTER: Cybersecurity Legal Task Force Vendor Contracting Project: Cybersecurity Checklist | Business Law Section
5 Unforgettable Train Trips Across the U.S.
Oracle Database 18c "Hands-Off" Data Guard Build Using VirtualBox and Vagrant | The ORACLE-BASE Blog
5 Things You Didn't Know You Could do with Nmap - Daniel Miessler
Beyond the Firewall - Different Rules for East-West Traffic | CSO Online
Chris's Wiki :: blog/python/DjangoWeNeedTests
Chris's Wiki :: blog/solaris/ZFSAndDirectoryDType
Chris's Wiki :: blog/sysadmin/ManyFilesBackupProblem
Chris's Wiki :: blog/sysadmin/QuietConfigurationDrift
Patch Lady – Microcode confusion @ AskWoody
Mind boggled: The Meltdown/Spectre microcode patches @ AskWoody
Identify an AD object from the SID | Alan's Blog
Listing (and running) OS Shell Commands with PowerShell | Alan's Blog
Create a Hash Table with AD Domain DNS Root and NetBIOS Names | Alan's Blog
Remove a DSC config | >_
How do I install Guest Additions in a VirtualBox VM? - Ask Ubuntu
About the Turkish-I Problem | >_
Security 101 Series volume 1 -
VMware OS Optimization Tool
We are changing the way we name VMware certifications. The Year Makes It Clear. - VMware Education Services
Home Lab Power Automation – Part 3 – vswitchzero
Ansible Roles for VMware SDDC Deployments - Virtual Elephant
Technical notes, my online memory: Scrub GPS location from JPEG EXIF data
Trying out the Azure Firewall in a Hub & Spoke deployment model – Karim Vaes
IRC turns 30! – Virtually Fun
Backup Best Practices with Unsupported Databases
Hard Drive Breakthrough in 2019? Technology Clash: HAMR vs MAMR
Proper TempDB creation for Configuration Manager | Steve Thompson [MVP]
Azure Site Recovery – From Start to Finish – Anthony on Azure
Python: seven simple things network engineers need to know | Open-Source Routing and Network Simulation
Interview: Benefits of Network Automation (Part 2) « ipSpace.net blog
Interview: Benefits of Network Automation (Part 1) « ipSpace.net blog
Deploy WebLogic docker images using Docker Toolbox and Virtual Box on Windows - Blog dbi services
RV Life and Working Remote – DBA Kevlar
Restoring a database without having any controlfile backup - Blog dbi services
VMworld 2018 US: vSphere Platinum and other vSphere Updates – Ather Beg’s Useful Thoughts
Cohesity – Harnessing the Power of Data – Ather Beg’s Useful Thoughts
The Performance Hit For A Xeon-Backed Ubuntu Linux VM With L1TF / Foreshadow Patches - Phoronix
The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED
Trump’s Secret Order on Pulling the Cyber Trigger - Lawfare
Artificial Intelligence – A Counterintelligence Perspective: Part II - Lawfare
Heterogeneous Memory Management Still Being Worked On For Nouveau / Radeon / Intel - Phoronix
12 of the Best Free Linux Chess Apps (Updated 2018) - LinuxLinks
FOSS: passive consumerism kills our community | Carl Chenet's Blog
Partitioning a 7 exabyte disk | Richard WM Jones
Kubernetes is the new operating environment (Part 1) - RHD Blog
This Is Your Solution For Open Source Motion Tracking | Hackaday
A sysadmin's guide to containers | Opensource.com
4 Ansible playbooks you should try | Opensource.com
6 open source tools for making your own VPN | Opensource.com
How to use KA Lite to serve up educational content | Opensource.com
Essential LaTeX Tools - typeset beautifully (Updated 2018) - LinuxLinks
VMware Goes Platinum for vSphere Virtual Server Deployments
StingRay - simple chess graphical user interface - LinuxLinks
Everything You Need to Know about Linux Containers, Part II: Working with Linux Containers (LXC) | Linux Journal
12 Best Hacking Tools Of 2018 For Windows, Linux, And OS X
Getting started with Sensu monitoring | Opensource.com
12 Easy Steps to Speed Up Ubuntu Linux
Joplin: Encrypted Open Source Note Taking And To-Do Application - Linux Uprising Blog
Monitoring OpenVPN ports and the ways of Open Source – /home/liquidat
Federated CI
How to Travel Across the U.S. on a Budget
Post-Wayfair Options for States | South Dakota v. Wayfair | Tax Foundation
Lo Mein Noodle Salad Recipe -- Gluten Free, Vegan, Delicious, and Easy | Penniless Parenting
Pennsylvania: A 21st Century Tax Code | Tax Foundation
The Importance of a Well-Organized Kitchen | Penniless Parenting
Warren Buffett Old Interview - NevBlog
Warren Buffett on Reaching Stock Market Highs — My Money Blog
How to get rich and stay rich ~ Get Rich Slowly
How to Restore Files from Backblaze - TidBITS
How a 1998 meeting with Steve Jobs gave birth to Wi-Fi | Wi-Fi NOW Events
Lego's new toy train is a STEM tool for preschoolers
What early retirement was like in 1957 ~ Get Rich Slowly
All of the money books I've reviewed during the past twelve years
My digital shadow looks nothing like me
'Disable SMT/Hyperthreading in all Intel BIOSes' - MARC
Foundries.io promises standardized open source IoT device security | TechCrunch
5 open source tools for container security | Opensource.com
9 flowchart and diagramming tools for Linux | Opensource.com
Aqua Security Releases Kube-Hunter Container Penetration Testing Tool
Keeping patient data safe with open source tools | Opensource.com
How to Make Your Ubuntu PC a Wireless Access Point
Windows Server 2019 - What is coming Next - Thomas Maurer
Configure Fine-Grained Password Policies for Specific Users in Active Directory
Designing a Database: 7 Things You don't Want To Do
Powershell and Lotus Notes – Luka Gros
Sharkfest 2018 - TCP Fundamentals Part 1 (by Chris Greer)
Everything You Need to Know about Linux Containers, Part I: Linux Control Groups and Process Isolation | Linux Journal
Proving ROI: How a Security Road Map Can Sway the ...
Why you should be skeptical of financial blogs ~ Get Rich Slowly
A Convenient Guide to Project Management Courses
Updating SSL Certificates on vCenter and Platform Services Controllers
MikroTik Automated MPLS L3VPN Lab – neckercube.com
The Cybersecurity Regulations Healthcare, Financial Services, and Retail Industries Must Know About | CSO Online
Homemade Gluten Free Vegan Thin Mints or Mint Chocolate Wafer Cookies Recipe -- Frugal and Easy | Penniless Parenting
Messy Insider Breach Impacts 258,000 Over Five Year Span
Augusta University Health Reports Major Data Breach
Troubleshooting TLS Certificates - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Add AWS Web Application Firewall to Protect your Apps - The IT Hollow
The Dangers in the Trump-Brennan Confrontation - Lawfare
The Forgotten Art of Riveted Structures | Hackaday
vCenter Server Appliance (vCSA) automated/unattended deployment - IVOBEERENS.nl
HostsSources · AdAway/AdAway Wiki · GitHub
Configuration Management for Windows - Stack Overflow
DSC + Ansible – Trond's Working!
Updated: Lanmanserver and Lanmanworkstation Tuning
Configuration in a DevOps world – Windows PowerShell Desired State Configuration | PowerShell Team Blog
Introducing PowerShell Desired State Configuration (DSC) | Building Clouds
Under The Stairs: Events in the Security Event Log
Vulnerability Disclosure Policy Basics: 5 Critical Components | HackerOne
Updating CTL's in disconnected environments in Windows - ITS ALL ABOUT MICROSOFT WINDOWS CLIENT, SERVERS AND MUCH MORE
Using Wasabi S3 Object Storage with containers
Otter | Provision your Servers and Manage Configuration | Inedo
OpenControl
Cloud-A - True Canadian Cloud for Development TeamsCanadian Cloud Infrastructure | True Cloud
US bans government personnel from using Huawei and ZTE devices
Keiretsu Safe Haven Fading For Mitsubishi Heavy Industries (TSE: 7011) - Kenkyo Investing
The Benefits of Automating Web Application Vulnerability Scanning | Netsparker
røøtz Asylum
nikon photography
Servers for Hackers
So You Got Yourself a Loadbalancer | Servers for Hackers
1. OWASP_develope_secure_software_with_OWASP20180621 - 1. OWASP_develope_secure_software_with_OWASP20180621.pdf
OWASP Defect Dojo
Health care industry is king of the malicious insider threat
Reinforcement Learning and AI - Data Science Central
What's hot in AI: Deep reinforcement learning | VentureBeat
Understanding Get-SpeculationControlSettings PowerShell script output
Heads Up: Enabling Speculative Store Bypass Disable will make your Windows installation unable to boot if you have old enough cpu microcode : sysadmin
SANS Top 25 Procurement Language and the OWASP Secure Software Contract Annex | tssci security
IEC 80001 - An Introduction | Medical Connectivity
SSD Form Factors Proliferate At Flash Memory Summit 2018
OpenVAS 8.0 Vulnerability Scanning | Kali Linux
iTWire - Red Hat's Jim Whitehurst on strategy and culture
WAF Buster - Disrupt WAF By Abusing SSL/TLS Ciphers - KitPloit - PenTest Tools for your Security Arsenal ☣
WAF_buster
Windows Privilege Escalation (AlwaysInstallElevated)
A Clear Guide to L1TF and Foreshadow, the Latest Intel CPU Flaws
How to Document Security Incidents for Compliance in 10 Steps - Security Boulevard
VERIS INCIDENT FRAMEWORK - Security Boulevard
NBlog - the NoticeBored blog: NBlog August 17 - risk terms and concepts
‘Foreshadow’ flaw found in Intel CPUs – what to do – Naked Security
A.I. in diabetes care: Can we trust it if we don’t know how it works?
Phishing Attack Last Year Exposed Health Data on 417,000
Windows Privilege Escalation (Unquoted Path Service)
Three-quarters of corporate network breaches are via web applications
Balancing cybersecurity and regulatory compliance | CSO Online
Turning Cheap WiFi Modules Into Cheap WiFi Swiss Army Knives | Hackaday
The Wonderful World of USB Type-C | Hackaday
Active Directory: LDAP Syntax Filters - TechNet Articles - United States (English) - TechNet Wiki
PowerShell Script Module Design: Public/Private versus Functions/Internal folders for Functions – Mike F Robbins
The 10/10/10 Rule For Tough Decisions
Visualizing a DevOps mindset | Opensource.com
Oracle Database causing Linux auditd logs to grow fast - DBA - Rodrigo Jorge - Oracle Tips and Guides
IXP Graphs are an Eyesore · Lindsay Hill
20 Random Facts About Traveling In Airplanes | foXnoMad
How to Write a Winning Proposal for Your Doctoral Dissertation
How Agile helps non-technical teams get things done | Opensource.com
How the L1 Terminal Fault vulnerability affects Linux systems | Network World
Cyber Warnings About Certain Philips Medical Devices
How to Comply with HIPAA Regulations – 10 Steps
RDP not working for my cloud service – Demystify
Top 5 Mobile App Security Failures and How To Prevent Them – Visual Studio App Center Blog
Azure 101: Governance – Cloud Solution Architect
Brian's Home Theater PC: The Hardware - briancmoses.com
IDEAS IN FOOD: Beignets
Dawn of the First Digital Camera | Hackaday
What Is Foreshadow? How This Intel CPU Vulnerability Might Affect You
A Beginner's Guide to Understanding White Balance
5 Reasons to Update Your Raspberry Pi and Raspbian Regularly
The 7 Best Text-to-Speech Apps for Android
7 Cool Bluetooth DIY Projects That'll Upgrade Your Old Gadgets
Offensive Cyber Operations and the Interagency Process: What’s at Stake With the New Trump Policy - Lawfare
How to Install FreeRADIUS on Ubuntu
52% of businesses have weak cybersecurity vulnerability assessment strategies - TechRepublic
Here is the maturity level each VA style represents: Diligent: High maturity level Investigative: Medium to high maturity level Surveying: Low to medium maturity level Minimalist: Low maturity level Only 5% of enterprises have a Diligent style, which means those companies have frequent vulnerability assessments and customized assessments for different business units and groups, said the post. However, 33% of enterprises had a Minimalist VA style, conducting few assessments, according to Tenable. Most companies still have a lot of work to do to protect themselves in the event of a cyberattack. "The ultimate objective - regardless of which style most closely aligns to your own - is to always keep evolving toward a higher level of maturity," Tenable said in the blog post. Check out TechRepublic's article for recommended approaches to preventing an attack.
ICS Security: The European Perspective - Security Boulevard
When It Comes to Data Breaches, Healthcare Businesses Stand to Lose Most - Security Boulevard
Android Man-in-the-Disk Attack Can Expose Apps & User Data
The Ultimate Guide to DoD 8570 - Security Boulevard
DeepLocker: new breed of malware that uses AI to fly under the radar - Security Boulevard
What is DoD 8570? - Security Boulevard
How to Achieve DoD 8570 IAT Level I Compliance - Security Boulevard
How to Achieve DoD 8570 IAT Level I Compliance - Security Boulevard
Zombies: Top 5 Open Source Vulnerabilities That Refuse To Die
6 most common cyber attacks - Security Boulevard
Cloud Security Myth vs. Fact #2: Is Encryption the Best Security for Data at Risk?
What CEOs and CFOs Should Know: The 7 Costs of SaaS Data Loss - Security Boulevard
Your Infosec Supply List - Black Hills Information Security
Fact vs. Myth: A Protegrity Cloud Solutions Blog Series | Protegrity
KeyPass ransomware - Securelist
PCI DSS & GDPR: The Similarities & Differences - Semafone
Over 2,300 Data Breaches Disclosed So Far In 2018, Exposing Over 2.6 Billion Records
More Than 10,000 Vulnerabilities Disclosed So Far In 2018 – Over 3,000 You May Not Know About
Managing risk in the modern world - Red Hat Customer Portal
Is it Legal To Use a VPN Service? (Depends on Where You Live)
Jolly Roger Telephone | Revenge Has Never Been So Sweet
The Black Vault Home Page - The Black Vault
Cybersecurity Experiences at Small Organizations | CSO Online
The state of cybersecurity at small organizations | CSO Online
Video Shows Hotel Security at DEF CON Joking About Posting Photos of Guests' Belongings to Snapchat - Motherboard
A White Paper About Security White Papers That Looks Like a Security Article
Cybersecurity threats: How to discover, remediate, and mitigate – Microsoft Secure
How Microsoft 365 Security integrates with your broader IT ecosystem—part 3 – Microsoft Secure
DependencyCheck v3.3.1 - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies - KitPloit - PenTest Tools for your Security Arsenal ☣
BlackEye - The Most Complete Phishing Tool, With 32 Templates +1 Customizable - KitPloit - PenTest Tools for your Security Arsenal ☣
MPs concerned about the UK’s cyber security – IT Governance Blog
12 Things Mentally Strong People Do That Nobody Else Does
How to leverage GDPR compliance for increased consumer trust
Are Legacy Medical Device Security Flaws Going Unfixed?
Should Staff Ever Use Personal Devices to Access Patient Data?
HHS OIG Finds Security Flaws in Maryland’s Medicaid System
Healthcare Exchange Standards: Healthcare use of Blockchain on FHIR
Hacking pacemakers, insulin pumps and patients' vital signs in real time | CSO Online
Take-aways from Black Hat USA 2018 | CSO Online
The unintended consequences of GDPR | CSO Online
Vegas hotel room checks raise concerns at Def Con, Black Hat | CSO Online
Debian Turns 25! Here are Some Interesting Facts About Debian Linux | It's FOSS
Oracle open sources Graphpipe to standardize machine learning model deployment | TechCrunch
Testing web applications with Selenium [LWN.net]
L1TF/Foreshadow News and Benchmarks | Tux Machines
Automating backups on a Raspberry Pi NAS | Opensource.com
Asia Pacific Consumers Prioritize Security Over Convenience in the App Experience | APMdigest - Application Performance Management
Why IT Support Needs Professionalism | Purple Griffon
Create Disk Usage Reports with PowerShell and WizTree – smsagent
Adding Another Disk to the RAID 10 on My KVM Server - Patshead.com Blog
Layer 1 Troubleshooting Scenario (by Tony Fortunato)
Infrastructure TAP's and the need for a comprehensive network visibility system! (by Gabriel Guriencu)
Chris's Wiki :: blog/spam/ZipAttachmentWithEverything
Chris's Wiki :: blog/sysadmin/AccountCreationScriptEvolution
Foreshadow (L1TF) Intel CPU vulnerabilities | Born's Tech and Windows World
Microsoft Security Advisory Notification (August 14, 2018) | Born's Tech and Windows World
Why luck might be subjective and not part of the world | Aeon Essays
Tsutomu Yamaguchi
Everyone Worries About Money, Even The Wealthy — My Money Blog
How to easily update your VMware ESXi Hypervisor to the latest version with one ESXCLI command | TinkerTry IT @ Home
Understanding L1 Terminal Fault Mitigation | TinkerTry IT @ Home
What Is the Real Value of $100 in Your State? | 2018 | Tax Foundation
Homemade Gluten Free Vegan Falafel Recipe -- Grain Free, Delicious, and Easy | Penniless Parenting
inanzzz | Some useful notes about HAProxy, load balancing, Keepalived and security
OZON innovates by integrating ModSecurity with HAProxy - Ozon Cybersecurity Blog
Scalable WAF protection with HAProxy and Apache with modsecurity - HAProxy Technologies
Using vRealize Suite LifeCycle Manager to deploy an Enterprise Distributed vRealize Automation environment. | JohannStander
Vulnerability in Java VM Component of Oracle Database allows for Whole System Compromise - Appuals.com
Git Basics - Git Series Part 1
Vocal - a modern Vala podcast player - LinuxLinks
Microsoft Patch Tuesday 17134.228 Enhances Battery Performance and Mitigates L1TF Vulnerability - Appuals.com
ClickUp - An Awesome Project Management and Productivity App
Encrypting NFSv4 with Stunnel TLS | Linux Journal
Ubuntu updates for L1 Terminal Fault vulnerabilities | Ubuntu blog
L1 Terminal Fault - The Latest Speculative Execution Side Channel Attack - Phoronix
A sysadmin’s handy cheat sheet for SELinux | Opensource.com
No communication skills? Tech is not for you! | The ORACLE-BASE Blog
ODA database been stuck in deleting status - Blog dbi services
Intel discloses another set of processor vulnerabilities
VMware Security Advisory VMSA-2018-0020 and VMSA-2018-0021 - L1 Terminal Fault (L1TF): CVE-2018-3646, CVE-2018-3620, and CVE-2018-3615 - VMware Security & Compliance Blog - VMware Blogs
Comparison between Ansible and Puppet – Codingbee
BGP for Beginners
Beginner's Guide to Understanding BGP
Five Wishes: A Living Will That Goes Beyond Just Prolong / Do Not Prolong Life — My Money Blog
Wish 1: The Person I Want to Make Care Decisions for Me When I Can’t. Wish 2: The Kind of Medical Treatment I Want or Don’t Want. Wish 3: How Comfortable I Want to Be. Wish 4: How I Want People to Treat Me. Wish 5: What I Want My Loved Ones to Know.
Vulnerability Scanning vs. Penetration Testing: What is the difference, and what is right for me? – The Personal Blog of Sean Goodwin
How Mature Are Your Cyber Defender Strategies? - Blog | Tenable™
Must-Know Ransomware Statistics 2018
Cyber Attacks Make July a Painful Month for Healthcare
Open FAIR Complements Risk Management Programs | Security Architects Partners
IT threat evolution Q2 2018 - Securelist
NBlog - the NoticeBored blog: NBlog August 9 - cyberterms
Black Hat USA 2018: SamSam has yielded $6M for creators
TIDoS Framework - The Offensive Web Application Penetration Testing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
TIDoS
The only free ISO 27001 resources you will ever need – IT Governance Blog
Do you know the difference between cyber security and information security? – IT Governance Blog
How business continuity contributes to your organisation’s cyber resilience – IT Governance Blog
The Top 3 Open Source Tools for AWS Incident Response - Delta Risk
Gerald M. Weinberg: Writer - Consultant OFFICIAL WEBSITE Dedicated to Helping Smart People be Happy
GOP chair urges Senate to pass DHS cyber reorganization bill | TheHill
DevSecOps: The Keys to Success - HealthcareInfoSecurity
HIPAA Security Rule Turns 20: It's Time for a Facelift
Tom Walsh
CNIL warns pair of smaller companies about GDPR violations
Errata Security: What the Caesars (@DefCon) WiFi situation looks like
Vectra Spotlight Report - Manufacturing 2018
(2) New Messages!
Nmap Cheat Sheet – it…'s Notes
PRINCE2 project management with OpenProject – it…'s Notes
DISA Approves STIGs for VMware NSX on DoD Networks
Custom Certificate Replacement Guide
Network Architect vs Network Engineer (Part 2) — jumboframe.net
Network Architect vs Network Engineer (Part 1) — jumboframe.net
Altering MDT Task Sequence to Update from Windows Update – Stick To The Script
CISSP Study Agenda and Resources, 16-Weeks : cissp
Active Directory: Workstation Logon Restrictions (Log On To)
Server-side Ransomware SAMSAM Hits Healthcare Industry - Security News - Trend Micro USA
What Makes SamSam, the Ransomware that Crippled Atlanta, So Different
RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…
Chris Hafey's Blog
My Road Warrior Survival Guide
Rethinking The Need For WSUS – Stick To The Script
6 Eye-Raising Third-Party Breaches
IBM WAS Global Security problems with Active Directory when Workstation Restrictions are configured - United States
LDAP error codes | ServiceNow Docs
Automate password changes with Ansible
Chrissanders88 presentations
Active Directory Schema Management | Alexander's Blog
acr2018final - cisco-acr-2018.pdf
How to Improve the California Consumer Privacy Act of 2018 | Electronic Frontier Foundation
User Login on JMX-console ;( |JBoss Developer
IDEAS IN FOOD: Triple Chocolate Remix
Trip of a lifetime to Japan
DSHR's Blog: The Blockchain Trilemma
Ultimate List of Tensorflow Resources for Machine Learning Engineers - Big Data Beard
Successful IT Departments Engage with End Users | APMdigest - Application Performance Management
PowerShell One-liner to Extract a Windows 10 Upgrade Error Code – smsagent
FreeBSD has its own TCP-queue-of-death bug, easier to hose than Linux's SegmentSmack • The Register
Windows 10 V1803: Domain join bug and a workaround | Born's Tech and Windows World
21 SysAdmin Influencers, Bloggers and Geeks to Follow - ITChronicles
The mechanics of Windows patching - in plain English | Computerworld
We continue at MS-DEFCON 1: Don’t install any of the July patches @ AskWoody
redhat: Cloudification Is Coming, but Service Providers’ Processes and Culture Must Change | Al Bawaba
The CEO of Red Hat Wants to See His Employees Cussing and Crying. The Reason Behind It Is Priceless | Inc.com
Easy Disaster Recovery Plan – neckercube.com
Firewalld: The Future is nftables - RHD Blog
VMware NSX - Top 9 Free Books To Read | ESX Virtualization
Black Hat USA 2018: Google, Microsoft and Red Hat dish on the Meltdown/Spectre backstory
Varying Tiers in the MSP Help Desk — Building Your Support System
Geo Redundancy: Amazon S3 vs Microsoft Azure Blob vs Google Cloud Storage
Delicious Onion Mushroom Pasta Recipe -- Gluten Free, Vegan, Frugal, and Easy | Penniless Parenting
Building a better thermostat with Home Assistant | Opensource.com
Multiple Flaws Discovered in Healthcare Software Firm - Infosecurity Magazine
How to Install and use Open vSwitch (OVS) 2.9 with KVM on CentOS 7 / RHEL 7 Server
DocBook - markup language for technical documentation - LinuxLinks
5 Tools to Scan a Linux Server for Malware and Rootkits
How to Install InvoicePlane on Ubuntu 18.04 LTS
South Carolina TV maker laying off most workers, blaming Trump tariffs - Japan Today
How to become a certified DPO – IT Governance Blog
WannaCry Outbreak Hits Chipmaker, Could Cost $170 Million
Do you need a vulnerability disclosure program? The feds say yes | CSO Online
PMKID Vulnerability that bypasses 4-way Handshake discovered in WPA2 WiFI Encryption - Appuals.com
Empowering Operations to Tackle Ransomware with Rubrik Polaris Radar - Wahl Network
Updating Debian from stretch to buster aka Debian 9 to 10
WannaCry has infected chip maker TSMC fabs … | Born's Tech and Windows World
Feeling the Heat of High-Frequency Trading | Hackaday
FAQs About Master's Degree in Cybersecurity from WGU | Alexander's Blog
Mastering MITRE's ATT&CK Matrix
Mitre ATT&CK matrix
Atlanta’s Reported Ransomware Bill: Up to $17 Million
How America Can Stop Being the Wild West of Data - Bloomberg
U.S. Treasury calls for national data breach notification and increased data protections
Black Hat Arsenal USA 2018 — The w0w lineup – Hack with GitHub – Medium
Most SMBs Not Equipped to Handle Security Concerns: Study
Do you have a data breach response plan? – IT Governance Blog
What is business continuity/ISO 22301 and why do you need it? – IT Governance Blog
Resurrecting a Dead Library: Part Two - Stabilization - mtlynch.io
A new WPA/WPA2 attack with PMKID | Born's Tech and Windows World
Failure Scenarios for vSAN — ThinkCharles.net
How To Enter BIOS Utility (UEFI Settings) On All PCs And Boot From USB?
Discus - Show Colourised Disk Space Usage in Linux
Proxmox config directory & files | SvennD
VMware vSphere 6.7 Performance Best Practices PDF | ESX Virtualization
Protecting your thoughts – Data Protection Hub
Valuable Lessons from My Second Year of Freedom | Mad Fientist
When cheap and simple turns into anything but… | A Rambling Geek
Snippet 0x0E: Booting image files and ISOs with KVM/QEMU (EFI and BIOS) - Philipp's Tech Blog
Raccoon - A High Performance Offensive Security Tool For Reconnaissance And Vulnerability Scanning - KitPloit - PenTest Tools for your Security Arsenal ☣
The default OpenSSH key encryption is worse than plaintext
Doc Searls Weblog · A helpful approach to personal data protection regulation
20180724-economic-espionage-pub.pdf
Increased Windows Modules coverage with PowerShell Core 6.1 | PowerShell Team Blog
SQL Performance troubleshooting guide: A walk through – Don Castelino
What are the best Performance Testing Tools? – Testing Spot
How to Find & Replace Outdated Windows Drivers
driverquery > driver.txt
Happy Birthday, Harry Potter: wizard-worthy Pi projects - Raspberry Pi
For a 7-Minute Workout, Try Our New App - The New York Times
Invoke-VMScriptPlus v2 - LucD notes
Diffusing The IT Blame Game With Network Visibility (by Keith Bromley)
Windows EOL dates differs for clients and servers | Born's Tech and Windows World
Venezuela says Maduro was target of attempted drone attack
My Own Car System, Rear Camera, Offline Maps & Routing, Map Matching with Go on Raspberry Pi part II · Fabrice Aneche
My Own Car System, Rear Camera, Offline Maps & Routing on Raspberry Pi part I · Fabrice Aneche
How to Make Android Faster: What Works and What Doesn't
Zero Day Initiative — Checking In: A Look Back at the First Half of 2018
Internet edge device security - NCSC Site
Global Threats to Information Systems | US-CERT
Securing Network Infrastructure Devices | US-CERT
6 Steps to Build an Incident Response Plan | Webroot
Windows Incident Response: The Future of IR, pt I
Thoughts on the Information Security Skill Set •
CSP Falco Space Asset - FINAL.pdf
Spectre: the vulnerability that just keeps on giving
Gen V Security - Bridging the (Cybersecurity) Generation Gap
OWTF v2.4 - Offensive Web Testing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
The age of cyberwar is here. Now, citizens need to have a say | David Sanger | Opinion | The Guardian
The Art of the Presentation (Part 3 of 3) | Thom Langford
Check IIS Health (Services, Site, AppPool Statuses) - Syspanda
Tracking & Monitoring Domain Admins with Logstash - Syspanda
Generate Windows Services Report - Syspanda
APT Trends Report Q2 2018 - Securelist
The Top 20 Penetration Testing Tools, Part 2
The GDPR is not a one-day thing - Security Art Work
Active Directory Security Risk Factors and What to Do About Them (Part 2) | Security Architects Partners
Active Directory Security Risk Factors and What to Do About Them (Part 1) | Security Architects Partners
CIS Adapts Critical Security Controls to Industrial Control Systems - Blog | Tenable™
Cybersecurity Benchmarking: Where’s The Data? - Blog | Tenable™
Cookies and consent at the IAPP
Cryptojacking – More than a Nuisance, It Poses a Serious Threat to Data Centers
Vulnerability Management: Why the Problem Can't Be Solved
HHS Weighs Changes to Health Data Privacy Regulations
Securing the Internet of Things | US-CERT
FBI Releases Article on Securing the Internet of Things | US-CERT
Patch Lady – my response @ AskWoody
How GDPR Could Turn Privileged Insiders into ...
How to Set Clock Time on AD domain Controller and Sync Windows Clients – jasoncoltrin.com
How to configure multiple NTP network time servers on a Windows client · Ctrl blog
Find Windows 10 Upgrade Blockers with PowerShell – smsagent
Introducing: A Diverse, Free Stock Photo Library — The WordPress.com Blog
All about headroom and mandatory patching before June 2019 | Frits Hoogland Weblog
SDKMAN - A CLI Tool To Easily Manage Multiple Software Development Kits
Rose Eveleth, Podcast Producer | Cool Tools
AWS IoT Device Defender Now Available – Keep Your Connected Devices Safe | AWS News Blog
Configuring Ansible to Manage Windows Servers – Step by Step | Argon Systems
Testing POE with Pockethernet (by Tony Fortunato)
A PowerShell Conference In A Book | SQL DBA with A Beard
Senator suggests ways to combat misinformation and boost data privacy
The US is not prepared to shape global internet policy
Managed detection and response supports internal security teams
20 Fascinating Subreddits With Facts and Stories That'll Blow Your Mind
An open letter to Microsoft management re: Windows updating | Computerworld
Windows (10) Update Survey and an open letter to Microsoft | Born's Tech and Windows World
July 2018 patches: Review for administrators | Born's Tech and Windows World
It's Becoming Difficult to Discuss Interesting Topics With People Who Don't Read - Daniel Miessler
WTF - A Terminal Dashboard
Risk Based Security Announces Sponsorship and Integration With OWASP Dependency-Track
Security Technologies: ExecShield - Red Hat Customer Portal
SPECTRE Variant 1 scanning tool - Red Hat Customer Portal
American Cyber Security Firm FireEye Denies Hacking Chinese Military - Motherboard
We Need to Change the Dictionary Definition of 'Hacker' - Motherboard
Looking back at Microsoft’s July 2018-Patches | Born's Tech and Windows World
Virtualization The Future: VMware Certification Tracks and Levels Explained
All of Kodi Common Errors In This One Guide (With Images)
Your essential guide to what sysadmins really mean – Naked Security
Katello: Security Compliance Management with OpenSCAP | Lisenet.com :: Linux | Security | Networking
Intel patches three vulnerabilities in its Smart Sound Tech
WAScan v0.2.1 - Web Application Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Faraday v3.0 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest Tools for your Security Arsenal ☣
CCTV and the GDPR – an overview for small businesses – IT Governance Blog
Ensure you’re #BreachReady in the media sector – IT Governance Blog
The NIS Regulations: Why cyber resilience is crucial – IT Governance Blog
Mandatory documents for ISO 27001:2013 – IT Governance Blog
Ransomware Attack Leads to Discovery of Lots More Malware
Healthcare Exchange Standards: Privacy and Security Considerations for the use of Open APIs for Patient Directed Exchange.
Summary: The War on Normal People - Daniel Miessler
Anatomy of the American Death Spiral - Daniel Miessler
Best Cybersecurity Certifications to Consider in 2019 | Alexander's Blog
How To Burp With Confidence - Our 5 Favorite Features | CQURE Academy
SQL Server on Linux - I/O internal thoughts
ODA, network interface and configure-firstnet - Blog dbi services
rapid7-under-the-hoodie-2018-research-report.pdf
What is a race condition? | Born's Tech and Windows World
Real-Time Rogue Wireless Access Point Detection with the Raspberry Pi | Linux Journal
The US as a threat. Love for NATO. This is how Canadians feel about security issues
Great Books about Strong Girls and Women -A Short List » Public Libraries Online
SharePoint Talk: GDPR/DSGVO Field Guide for Office 365 & Azure
The Law of Military Cyber Operations and the New NDAA - Lawfare
How to Attach a High-Gain Antenna to a Router (And Which One to Buy)
15 of the Best Courses on Udemy for Self-Improvement
Get Started With Ethical Hacking Using Kali Linux and Raspberry Pi
Dockerizing R and Python Web Services – Microsoft Machine Learning Server
Azure Government Marketplace expanding with new Pay-As-You-Go offers – Azure Government Cloud
The Different Ebook Formats Explained: EPUB, MOBI, AZW, IBA, and More
How to Cat-Proof Your Laptop Computer and Desk Area
Becoming a Full Stack Product Person
It’s About Time and Project Management | The Networking Nerd
Navigating IT Chaos: Why the Challenges of Discovery and Inventory Are More Relevant Than Ever | APMdigest - Application Performance Management
The State of IT Service Delivery: Next-Generation Technologies Force Change | APMdigest - Application Performance Management
Create a USB Drive for Windows Server 2019 Installation
2018 BH/DC/BSidesLV Hiring List ·
MPECS Inc. Blog: Hypervisor, Cluster, and Server Hardware Nomenclature (A quick what's what)
White House reportedly working on federal data privacy policy
Samsung patches multiple SmartThings Hub security flaws
11 Ways (Not) to Get Hacked - Kubernetes
DevOps Hiring: The Ultimate Guide | The Enterprisers Project
How to Install and Manage Virtual Machines and Containers
Some of Intel's Effort to Repair Spectre in Future CPUs | Linux Journal
Install ELK as Centralized Logfile Management Server on CentOS 7
How to Flush the DNS Cache on Linux - Make Tech Easier
Spectre CPU Attacks Could Go Remote With NetSpectre
My VCAP Network Virtualization Deployment exam experience | viktorious.nl – Virtualization & Cloud Management
17 Key MySQL Config File Settings (MySQL 5.7 proof) - Speedemy
Tech "R" Us (by Paul W. Smith)
Cookbook development on the VMware platform
Clint Boessen's Blog: Excluding TEMP Directory from User Profile Disks in Remote Desktop Services
Healthy Chinese Restaurant Style Pineapple Chicken Recipe -- Paleo, Gluten Free, Allergy Friendly | Penniless Parenting
Licensing Microsoft SQL Server in a VMware Cloud on AWS Environment - Part 2 - VMware Cloud Community
VRO Enable lockdown mode – Virtual Me
Virtualization Based Security (VBS) in vSphere 6.7 - VMARENA
Is your home a better investment than the stock market?
Keys to Maintaining a Lean Business Model as a Big Corporation
Bank Grade Security
Georgia congressman is the latest to introduce data privacy bills
These vSphere Configurations Will Slow Down Your VMs
MySQL Load Balancing with HAProxy - Tutorial | Severalnines
BDB Podcast EP 35 - Exploring the magical world of Disney Data Analytics - Big Data Beard
U.S. GAO - High-Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation
Azure Stack Readiness Checker – AzsReadinessChecker
Turning Tactical IT Into Strategic IT | APMdigest - Application Performance Management
The Mentor/Mentee Relationship | Don Jones
Software supply chain attacks set to become a major threat
Exactis breach exposes 340M records, may compel GDPR-like reg in U.S.
Perspectives of a former CISO: Disrupted security in digitalization – Microsoft Secure
A sysadmin's guide to Ansible: How to simplify tasks | Opensource.com
Policy Analyzer – minor update – Microsoft Security Guidance blog
NBlog - the NoticeBored blog: NBlog July 20 - ISO/IEC 27001 and 27031 revisions
Basic Digital Security Could Have Prevented One of the Biggest Political Scandals in American History - Motherboard
Canadian Telecoms Make the Most Money on Mobile Data in the World - Motherboard
Driving data security is a shared responsibility, here’s how you can protect yourself – Microsoft Secure
Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework – Microsoft Secure
Equifax agrees to cybersecurity regulations set forth by 8 U.S. States
Faraday Beta v3.0 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest Tools for your Security Arsenal ☣
ProbeManager - Centralize Management Of Intrusion Detection System Like Suricata, Bro, Ossec... - KitPloit - PenTest Tools for your Security Arsenal ☣
TP-Link-defaults - Python Script For Trying Default Passwords For Some TP-Link Hotspots - KitPloit - PenTest Tools for your Security Arsenal ☣
THRecon - Threat Hunting Reconnaissance Toolkit - KitPloit - PenTest Tools for your Security Arsenal ☣
Doing More with Less: How MSSPs Succeed in Today's Cyber Landscape
VOOKI - Web Application Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Optiva Framework - Web Application Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Study suggests buried Internet infrastructure at risk as sea levels rise | EurekAlert! Science News
LogonTracer - Investigate Malicious Windows Logon By Visualizing And Analyzing Windows Event Log - KitPloit - PenTest Tools for your Security Arsenal ☣
KillerBee - IEEE 802.15.4/ZigBee Security Research Toolkit - KitPloit - PenTest Tools for your Security Arsenal ☣
5 data protection policies your organisation must have – IT Governance Blog
Load Balancing with HAProxy | StackPath Blog
How to do a SQL Vulnerability Assessment in SSMS - Mohammad Darab
ZDLRA ready for Oracle Database 18c – Upgrade your Database - NOW!
Real-life examples of social engineering – part 2 – IT Governance Blog
Real-life examples of social engineering – IT Governance Blog
How to perform a comprehensive vulnerability assessment – IT Governance Blog
Handling cyber threats in 7 simple steps – IT Governance Blog
Infographic: List of data breaches in 2017 – IT Governance Blog
25062018_Minimum_Cyber_Security_Standard_gov.uk__3_.pdf
Green paper: DSP Toolkit and NIS Regulations: The impact for healthcare organisations – IT Governance Blog
Maintaining independence of the DPO role in healthcare organisations – IT Governance Blog
How to simplify the data mapping process under the GDPR – IT Governance Blog
NIS Directive Consultancy
Information security and compliance training for the healthcare sector – IT Governance Blog
Tools to help identify gaps in your GDPR compliance – IT Governance Blog
The business case for ISO 27001 – IT Governance Blog
How to conduct an ISO 27001 internal audit – IT Governance Blog
The GDPR: Do you know the difference between personal data and sensitive data? – IT Governance Blog
The NIS Directive (NIS Regulations) – the UK law businesses need to know about – IT Governance Blog
Bill Text - AB-375 Privacy: personal information: businesses.
FDA: Make Sure EHRs Used for Clinical Studies Are Secure
Software Flaws: Why Is Patching So Hard? - HealthcareInfoSecurity
Why Cybersecurity Is Critical to Healthcare Innovation
A CIO on Carrying the Burden of Medical Device Cybersecurity
Cletis Earle
$4.3 Million HIPAA Penalty for 3 Breaches - HealthcareInfoSecurity
OpenSSH security and hardening - Linux Audit
How Can an ISAC Improve Cybersecurity and Resilience?
Comprehensive Guide to Sqlmap (Target Options)
Washington State to Launch Privacy Checklist Beta
DPO liability and potential insurance coverage
3 Ways Extract Password Hashes from NTDS.dit
LabCorp Still Recovering From Ransomware Attack
A New Effort to Draft Medical Device Cybersecurity Guidance
Equifax must incorporate stronger data security measures after massive breach, consent order says
EU Cybersecurity Plan Aims to Streamline Product Certification | Bloomberg Law
Cyber Readiness Institute
Global News Roundup — June 18–25, 2018
A year after WannaCry, healthcare organizations face mounting cyberthreats - Modern Healthcare Transformation Hub - Modern Healthcare
How your EU DPA wants your DPO's contact information
How many GDPR complaints so far?
AI spots legal problems with tech T&Cs in GDPR research project | TechCrunch
Brazil moves forward with online data protection efforts | ZDNet
Analysis: Vermont's data broker regulation
Amazon’s Healthcare Push Could Run into HIPAA Compliance Issues
The Best Encrypted Messaging Apps You Should Use Today [Updated]
Threat Model Thursdays: Crispin Cowan | Emergent Chaos
The Calculus of Threat Modeling — Leviathan Security
Errata Security: Lessons from nPetya one year later
Errata Security: SMB version detection in masscan
Evil Tester: Using a Travel Router for Mobile Testing
I reviewed 600+ call-for-paper submissions, (and you’ll probably guess what happened next.) – tisiphone.net
How to Test and Measure the Effectiveness of Your Security Awareness Program - Delta Risk
Aftershocks of GDPR: Making Sense of the Business-Wide Effects of New Data Privacy Laws - Delta Risk
Risk Deck | Emergynt
Adam Shostack: Tabletop Infosec Games
Cybersecurity Career Path – A Fresh Perspective - The Ethical Hacker Network
Cisco CPO: Privacy Is Not About Secrecy or Compliance
Secure by Default Is Not What You Think
A Technical Deep Dive into STARTTLS Everywhere | Electronic Frontier Foundation
The GDPR and Browser Fingerprinting: How It Changes the Game for the Sneakiest Web Trackers | Electronic Frontier Foundation
What We Talk About When We Talk About Risk
6 M&A Security Tips
Creating a Defensible Security Architecture
What The Code of Hammurabi Can Teach Us About Hardware and Software Liability - Daniel Miessler
The Evolution of the SOC and the CSIRT - Daniel Miessler
Getting Hired: A Few Tips ·
Windows 10 Pro V1803: SMBv1 ‘special traps’ | Born's Tech and Windows World
Lessons from My Strange Journey into InfoSec
How to perform a risk assessment: Rethinking the process | CSO Online
One-Third of Businesses Lack a Cybersecurity Expert
DNS Rebinding Explained - Daniel Miessler
New Cyber Center Opens at Augusta University in Georgia
Top reasons CEOs should care about privacy | CSO Online
gtir-executive-guide-2018.pdf
Home | balbix.com
Oracle CPU July 2018 | Onapsis
What makes CISOs successful? | CSO Online
To Raise Exceptional Children, Teach Them These 7 Values
Burstcoin Rig 1.0 & 1.5 being retired…. for a new rig – TDSheridan Lab
Solved: Use USG to block sites/apps, like ER - Ubiquiti Networks Community
GitHub - StevenBlack/hosts: Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by category.
Five ways to make your presentation better | Seth's Blog
We’re still clueless about lifetime value | Seth's Blog
Advisory on July 2018 .NET Framework Updates | .NET Blog
New TETRA Trunk Tracker for use with SDR# and the TETRA Demodulator Plugin - rtl-sdr.com
Using a HackRF to Spoof GPS Navigation in Cars and Divert Drivers - rtl-sdr.com
.Net-Framework Update July 2018 pulled | Born's Tech and Windows World
Understanding Advanced Features in a Network Packet Broker (by Greg Zemlin)
My vSphere 6.7 Upgrade – WOW! – Notes from MWhite
9 Useful Electronics Tools Under $13 | Cool Tools
IT Architect: Foundation in the Art of Infrastructure Design: A Practical Guide for IT Architects · vNinja.net
Patch those Dell Servers easily! · vNinja.net
Bare Metal Deployment of ESXi on HP Proliant Hardware: Part 3
NAS vs iSCSI: When You Need What
An Introduction to Cybersecurity: The First Five Steps – ThisHosting.Rocks
Patching my databases with the July 2018 PSU, BP and RU
I've reviewed and screened thousands of resumes, and I am sharing my preferred resume format, free to download as a Word doc (along with my best resume advice). : FinancialCareers
Small file performance on distributed filesystems - Round 2
Further Reflections on the Russian Hacking Indictment - Lawfare
How to convert System partition from MBR to GPT (EFI) on Windows 10 without loosing data – support for UEFI and SecureBoot – MILOSZENGEL.com
mbr2gpt
4 Steps to Automated Major Incident Management | APMdigest - Application Performance Management
9 New Microsoft Teams Features, Meetings and Chat Improvements - Tom Talks
Use PowerShell to Determine What Your System is Talking to – Mike F Robbins
The need for having both a DW and cubes | James Serra's Blog
Troubleshooting a Cloud Problem with Wireshark (by Paul Offord)
Building tiny container images | Opensource.com
Detect and correct orphaned ‘adminCount=1’ in Active Directory | >_
Revised .NET Framework Update KB4340558 (July 19, 2018) | Born's Tech and Windows World
Windows: Stop error 0xD1 in July 2018 updates explained | Born's Tech and Windows World
Rebuild
Streamlining build environment management with Linux containers
Linux Monitor Hard Disks Temperature With hddtemp - nixCraft
Building Debian packages in CI (ick)
How to Monitor Linux Server Security with Osquery
whowatch - Monitor Linux Users and Processes in Real Time
EncryptPad: Encrypted Text Editor For Your Secrets - Linux Uprising Blog
Free Virtual Machines from IE8 to MS Edge - Microsoft Edge Development
4n6k: Forensics Quickie: Identifying an Unknown GUID with Shellbags Explorer, Detailing Shell Item Extension Block 0xbeef0026, & Creative Cloud GUID Behavior
What is Yammer and why you need it - SharePoint Maven
Troubleshoot Windows 10 Battery Life and Modern Standby
Alacritty - A Fastest Terminal Emulator for Linux
Rewritten GandCrab Ransomware Targets SMB Vulnerabilities To Attack Faster
Linux history Command Tutorial for Beginners (8 Examples)
Seccomp security profiles for Docker | Docker Documentation
How The Update Framework is Working to Improve Software Delivery Security
SAP Security Notes July 2018 | Onapsis
The Best Blogs Every Network Engineer Must Follow - RouterFreak
MTU and TCP MSS
Microsoft 365 Usage Analytics, New Free Power BI Office 365 Usage Reports from Microsoft - Tom Talks
Containers or virtual machines: ​Which is more secure? The answer will surprise you | ZDNet
James Bottomley
Why the U.S. Needs Federal Data Privacy Legislation - Lawfare
9 Essential Personal Finance Skills to Teach Your Kid Before They Move Out
11 Stock Market Oddities — and How to Exploit Them
netdev day 1: IPsec! - Julia Evans
There are no shortcuts ~ Get Rich Slowly
Why ‘Find Your Passion’ Can Be Bad Advice — My Money Blog
Homemade Easy Apple Chips Recipe | Penniless Parenting
Why you should bundle the root CAs in your image - Fabio Alessandro "Fale" Locati's blog
Why DOD Should Look Before Leaping into Open Source | SIGNAL Magazine
6 Essential Tips to Help You Write Your World-Class Business Plan
The forever fallacy ~ Get Rich Slowly
Portland Underground Grad School
TxFS Linux File-System Supports ACID Transactions, Simple API - Phoronix
A Linux Sysadmin's Guide to Network Management, Troubleshooting and Debugging
Scout_Realtime - Monitor Server and Process Metrics in Linux
Insights Security Hardening Rules - Red Hat Customer Portal
Road to RHCA--Preparation Meets Opportunity | Linux Journal
The Road Less Traveled: Certifications Can Chart a Great Career in Linux and Open Source | Linux Journal
Taz Brown
Troy Hunt: The 111 Million Record Pemiblanc Credential Stuffing List
Teleconsole - Share Your Linux Terminal with Your Friends
5 open source principles that help DevOps teams excel | The Enterprisers Project
bootiso: Easy ISO To Bootable USB Drive From The Command Line - Linux Uprising Blog
Groot Simplifies Entering Chroot On Any Linux Distribution - Linux Uprising Blog
jobs.freenode.net
Is your Network Security Slowing you Down? (by Jason Nutt)
How to Prioritize Product Features and Improvements
Prioritizing a Technical Roadmap Against a Product Roadmap - via @codeship | via @codeship
What You Should Know About Penetration Testing - via @codeship | via @codeship
PowerShell For Programmers: Here Strings, There Strings, Everywhere Some String Strings – Kory Thacher
Book Review: Architecting Microsoft Azure Solutions – Exam Guide 70-535 – Azure Development Community
Staying up-to-date with .NET Container Images | .NET Blog
SAP on Azure: General Update – June 2018 | Running SAP Applications on the Microsoft Platform
Generating documentation as code with mermaid and PlantUML – Rule of Tech
White hat gray hat black hat - what's the difference? - The Silicon Underground
Budget pfSense build with workstation parts - The Silicon Underground
HP Z210
SAP on SQL Server – Performance Tuning and Optimization Clinic – Microsoft Premier Offerings for SAP
Understanding Containers – the layer between the operating system’s kernel and the application – Microsoft Faculty Connection
Key Differences between VM and Container Vulnerability Scanning – Steve Lasker's Web Log – blogs.msdn.microsoft.com/SteveLasker
PowerShell Settings file (import/export) – Joe Talks Microsoft
SharePoint User Adoption – SharePoint Steve
(82) Irving Younger's 10 Commandments Of Cross Examination at UC Hastings College Of The Law - YouTube
Windows Command-Line: The Evolution of the Windows Command-Line – Windows Command Line Tools For Developers
TEMPDB – Files and Trace Flags and Updates, Oh My! – MSSQL Tiger Team
MSDTC Supported Configurations – SQL Server Premier Field Engineer Blog
Preparing for Certified Kubernetes Application Developer (CKAD) exam and how it compares to CKA – Arsen Vladimirskiy
The SQL Server Defensive Dozen Part 2 – SQL Server Encryption, Key Management, And Data-At-Rest Encryption – SQL Server Cybersecurity
Steps for Hardening SQL Server 2016: The Defensive Dozen – SQL Server Cybersecurity
System.IO.Pipelines: High performance IO in .NET | .NET Blog
Raspberry Pi + Azure Functions + Cognitive Services + Microsoft Teams -> How a Pi informs us about lunch | modern workplace solutions
What is your Agile? – Premier Developer
The Best 18650 Battery and How to Avoid Buying Fakes
The 12 Best Kodi Add-Ons for Watching Live News
How to Network Boot a Raspberry Pi Without a MicroSD Card
8 Surprising Uses for Linux That You Can (Mostly) Try Yourself
How to Record Audio With a USB Microphone on Android
5 of the Most Famous Computer Viruses and Their Terrible Impact
5 Causes for a Raspberry Pi That Won't Boot (And How to Fix Them)
How to Encrypt and Protect Your Data and Files Using VeraCrypt
6 Helpful Machine Learning Tutorials and Courses to Grasp the Essentials
Secure coding practices in Java: challenges and vulnerabilities | the morning paper
How not to structure your database-backed web applications: a study of performance bugs in the wild | the morning paper
EnclaveDB: a secure database using SGX | the morning paper
Machine Learning Getting Started Guide | Tallan's Blog
Generating a WiFi Radio Heatmap with a Helical Antenna, Antenna Rotator and a HackRF - rtl-sdr.com
Tracking Police and Military Aircraft at the G7 Summit with an RTL-SDR - rtl-sdr.com
Has paying the ransom become business as usual? - Help Net Security
Exposing Hospital Pager Privacy Breaches - rtl-sdr.com
Ten awesome 3D-printable Raspberry Pi goodies - Raspberry Pi
How To Get Rockwell TechED 2018 Labs and Presentations for Free - The Automation Blog
Installing Powershell on Centos 7
Microsoft’s July 2018 patch mess – put update install on hold | Born's Tech and Windows World
Identity Theft, Credit Reports, and You | Kalzumeus Software
PowerShell Functions to Get Logged On User and Logoff Logged On User – Jason Pearce
Removing The Last Governor: Core Software Pricing - IT Jungle
IDEAS IN FOOD: Bubble Mix
Microsoft Teams Free Version, What's included, What's not? - Tom Talks
AWS Storage Gateway Recap – SMB Support, RefreshCache Event, and More | AWS News Blog
96-core ARM supercomputer using the NanoPi-Fire3 | Climbers.net
Teardown Of USB Fan Reveals Journalists’ Lack Of Opsec | Hackaday
U.S. GAO - Information Security: Supply Chain Risks Affecting Federal Agencies
How to use PowerShell jobs to parallelize scripts – Virtually Sober
A rare breed of the brute-force: A history of one attack
70 percent would leave a job if their digital activity was secretly monitored
How Nonprofits Practice Continuous Improvement | Beth's Blog
Best practices for securing the container life cycle – Laurent Domb OSS Blog (RHCA, AWS SAA,ITIL, eMBA)
CredSSP, Windows RDP connection error. | Nerd Drivel
Chris's Wiki :: blog/solaris/ZFSOurSparesSystemII
How to easily detect SMBv1 scanning by using your traffic! ( by John Bronson)
Open Source Elasticsearch Security: Using Cilium for Elasticsearch Access Control with No App/Container Changes — Cilium
PowerShell Script to Backup / Restore Clipboard Contents | chentiangemalc
The basics of continuous integration and delivery tools: BuildBot, CircleCI, Jenkins, Spinnaker, and Zuul | HPE
How to Setup Django Development Environment on Ubuntu 18.04
26 Useful Windows Command Prompt Tricks You Might Not Know
This Server Technology Is a Game Changer so You Better Be Ready – Blades Made Simple
Spear Phishing Attack Prevention Best Practices and Tools
How to Install PowerCLI on Ubuntu Linux 18.04 LTS
Latest Fling from VMware Labs - ESXi Compatibility Checker - Eric Sloof - NTPRO.NL
How To Become an NSX Expert in 72 Hours - ActualTech.io
80,000 Hours user data is affected by the Typeform data breach - 80,000 Hours
Fibre Channel vs iSCSI: Choosing with SAN in Mind
Microsoft Security Compliance Toolkit 1.0 | Microsoft Docs
Revisiting wallabag, an open source alternative to Instapaper | Opensource.com
2018-07: OpenSprinkler, Qubes OS | KWLUG - Kitchener-Waterloo Linux User Group
Windows Admin Center Update - New Features in latest build | ESX Virtualization
Create an IoT sensor with NodeMCU and Lua
How to enable all SysRq functions on Linux - LinuxConfig.org
DIY RV Offsite Backup and Media Server | Linux Journal
Chris's Wiki :: blog/python/SortTakesTupleKeys
Why Automation Matters : ITIL | The ORACLE-BASE Blog
How To Configure SSH Key-based Authentication In Linux - OSTechNix
How to Create and Delete Virtual Machine from Command line in OpenStack
What Is "Pseudo AI": Humans Disguised As Bots Because Manual Labor Is Cheap
WellMess: This Go-based Malware Attacks Both Linux And Windows Machines
6 must-read internet standards | Opensource.com
Tips for transitioning from Hudson to Jenkins
A Look at Federal Student Loan Borrowing by Field of Study – Robert Kelchen
Install Windows Admin Center (WAC) using DSC – PowerShell, Programming and DevOps
Rob England on Twitter: "From my presentation "Project Management was the worst thing ever to happen to IT" comes 20 dysfunctions of IT project management… https://t.co/EtfuaklBd8"
No visibility in the GDPR era, be ready for BIG fines! (by Derek Burke)
Should I move up the ladder or stay low and technical? - part 2 - The Matrix has you...
Chris's Wiki :: blog/sysadmin/HowWeSellStorage
Chris's Wiki :: blog/web/POSTWithoutContentType
Chris's Wiki :: blog/sysadmin/SSHAltPortNoSecurity
18c: some optimization about redo size - Blog dbi services
Azure Kubernetes Hackfest - Day 2 - Eric’s Azure Blog
Azure Kubernetes Hackfest - Day 1 - Eric’s Azure Blog
Setting up Nginx reverse-proxy for distributed Minio S3 deployment - CormacHogan.com
OS Hardening vs Data Protection: Is Your Data Really Safe?
Land Your First MSP Client: 6 Tips for Managed Service Providers
MSP Infographics: Managed IT Service Providers Survey
Why Freedom is Essential to Security and Privacy – Purism
Containers Break the Shared Responsibility Model Between Cloud Providers and Ops  - The New Stack
Linux With Education - Best Free Education Apps - LinuxLinks
Why SMS should never be used as second factor - Fabio Alessandro "Fale" Locati's blog
CentOS 6.10 Released, Scientific Linux 6.10 Coming Next Week - Phoronix
Using Ansible to set up a workstation - Fedora Magazine
MindForger - More Than A Notebook and Markdown IDE
Sosreport - A Tool To Collect System Logs And Diagnostic Information
10 killer tools for the admin in a hurry | Opensource.com
Weekend Reading: Python | Linux Journal
Terrible Ideas in Git | Linux Journal
AWS Online Tech Talks – July 2018 | AWS News Blog
Introducing the OpenFaaS Operator for Serverless on Kubernetes
ESXi CLIativity – Part 2 | Adventures in a Virtual World
What is RAMPAGE Attack? Why It Affects Every Android Since 2012?
Historical inventory of collaborative editors - anarcat
Solution for Windows Update Error 0x800705b4 (2018-06 Cumulative Update) | Alexander's Blog
Latest on TLBleed | Tux Machines
Ticketmaster’s data breach - what to do next
Pyenv - Install Multiple Python Versions for Specific Project
How to explain blockchain in plain English | The Enterprisers Project
Embedded software device security | Timesys Embedded Linux
PMP Certified!
The Vertica exam asked very little about the underlying architecture and use cases of the product and more about esoteric features and point-and-click GUI stuff. I find little value in vendor certifications and their exams when the questions are merely a marketing ruse.
LMTV LIVE | How To Diffuse The IT Blame Game (with Keith Bromley and Scott Peerbolte)
Jekyll is so much better than Drupal and Wordpress
Deployment Research > Research
I Didn’t Even Know I Was Sick – Ethan Banks
Creating connection between Azure and Amazon EC2 | geekdudes
Wellington Home Automation Hackers | Jethro Carr
Case Study: Scaling Your Data Scientist
Cloud Vendor Lock-in
LACP Configuration in vSphere 6.5 - JBcomp.com
Bare Metal Deployment of ESXi on HP Proliant Hardware: Part 2
Bare Metal Deployment of ESXi on HP Proliant Hardware: Part 1
Summary: The Department of Homeland Security’s Cybersecurity Strategy - Lawfare
Cilium 1.1: Istio sidecar mode, cri-o/containerd support, improved efficiency & scale, init policies — Cilium
WSUS: Microsoft Update Catalog Import failure | Born's Tech and Windows World
Remote security assessments in Solaris 11.4 beta | rootpool
Seven Ways to Protect Your Organization’s Privileged Accounts - CSO | The Resource for Data Security Executives
Private-Sector Initiatives for Cyber Norms: A Summary - Lawfare
A Glimpse into Private-Sector Cybersecurity in Japan - Lawfare
Tuned - Automatic Performance Tuning of CentOS/RHEL Servers
Passive income vs. passion income ~ Get Rich Slowly
Write an MBA-Worthy Business Plan That Will Lead You to Success
HSA Accounts: 4 Reasons Why They Benefit Your Business
DSHR's Blog: The Four Most Expensive Words in the English Language
Dan Ruderman, Physicist and technologist | Cool Tools
flashcards
Should I move up the ladder or stay low and technical? - part 1 - The Matrix has you...
Will IT Certifications Help My Career? - Big Data Beard
Advanced scheduling of your patching maintenance windows - System Center Central
Cloud Automation Boosts Revenue and Profitability | APMdigest - Application Performance Management
Automation of endpoint security is top priority for IT pros
Is antivirus still relevant for your organization?
The Dark Side of Stress - The IT Hollow
PowerShell: Hyper-V Virtual Machine Backup Utility (v4.3) – Stick To The Script
Azure Data Architecture Guide (ADAG) | James Serra's Blog
Connecting Azure virtual machines in different regions | geekdudes
Create Interactive Charts with WPF and PowerShell – smsagent
Cisco ASA: VPNs With Overlapping Subnets | PeteNetLive
My Super Frugal Trip to Brussels, Belgium | Penniless Parenting
Are Hypervisor's Commodity Today? — ThinkCharles.net
Patch Lady – cleaning up on the weekend @ AskWoody
Review: How InSpec 2.0 delivers comprehensive compliance | CSO Online
Authenticating Customers & Identifying Fraudsters - Pindrop
Cost savings of the cloud | James Serra's Blog
Understanding Cosmos DB | James Serra's Blog
PKI Infrastructure (01) – Introduction & Certificate Lifetimes | Erik Bussink
Deployment Research > Research
Moving to Hetzner VPS: Shorter legal docs as a competitive advantage · Ctrl blog
Chris's Wiki :: blog/unix/XBackspaceTerminateHistory
Chris's Wiki :: blog/sysadmin/RunningServersNotTrivial
Chris's Wiki :: blog/sysadmin/DisablingAccountChallenge
Chris's Wiki :: blog/solaris/ZFSDirectoriesAndChanges
Fix: Windows 10 hangs in update installation loop | Born's Tech and Windows World
Office 365: Zero-Font bypassing weakens email security | Born's Tech and Windows World
Using ARA Records Ansible Within Projects - EverythingShouldBeVirtual
GitHub - openstack/ara: ARA records Ansible Playbook runs and provides intuitive interfaces to browse them
Samsung packs 8TB into its new PCIe 4.0 SSD sporting 3,100MB/s read speeds, more | 9to5Toys
Terence Luk: Scoring an A grading from Qualys SSL Labs with VMware Horizon View 7.4.0 Security Server
Fix phones, tablets, laptops, more w/ this 77-in-1 screwdriver kit for $17 Prime shipped | 9to5Toys
Kickstarting your Z-Wave smart home: The best hubs, switches, sensors and more | 9to5Toys
Minio S3 object store deployed as a set of VMs on vSAN - CormacHogan.com
BCDR: Business Continuity and Disaster Recovery
Patching Oracle Database 18.1.0 to 18.2.0 on premises
A Quick Intro to the AWS CLI - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Creating a Database and Connecting on Oracle Cloud | EzDBA – BLOG
Anatomy of a perfect pull request | Opensource.com
Containers and Cloud Security | James Bottomley's random Pages
How to Monitor Nginx Performance Using Netdata on CentOS 7
GitHub - firehol/netdata: Get control of your servers. Simple. Effective. Awesome! https://my-netdata.io/
How to Use OpenVAS to Audit the Security of Your Network (2/2)
Vulnerability Scanning with OpenVAS 9 part 1: Installation & Setup - Hacking Tutorials
Can Congress Improve Our Cyber Deterrence Posture? - Lawfare
continuous integration should be fun
A Platform Of A Certain Age And Respectability - IT Jungle
Amazon Polly Plugin for WordPress Update – Translate and Vocalize Your Content | AWS News Blog
Installing Oracle Database 18c – Upgrade your Database - NOW!
Brendan Tierney - Oralytics Blog: Twitter Analytics using Python - Part 3
Brendan Tierney - Oralytics Blog: Twitter Analytics using Python - Part 2
Brendan Tierney - Oralytics Blog: Twitter Analytics using Python - Part 1
Cisco Switch Configuration: an Easy and Quick Guide - RouterFreak
Off to the Kubernetes – Networking in a Post VM world — EtherealMind
Supply-Chain Attacks: Why the U.S. Should Worry - Lawfare
The Cyberspace Solarium Commission: A Timely Proposal - Lawfare
June 19 Has Been Declared National FreeBSD Day, Happy 25th Anniversary FreeBSD!
Speeding up Cornercases | Angry Cane Ramblings
How Linux & Open Tech Empower Medical Healthcare | It's FOSS
My First CCIE Lab Attempt – neckercube.com
How To Build A 4-Week Treasury Bill Ladder: A Visual Guide — My Money Blog
Your LinkedIn Company Page Is Dull. Here Are 10 Ways to Fix That.
Why Automation Matters : Reliability and Confidence | The ORACLE-BASE Blog
Upgrade Oracle 12.2.0.1 to Oracle Database 18c on-premises
Identifying & Resolving Excessive CPU Overcommitment (vCPU:pCore ratios) | CloudXC
Linux, BSD, and everything else...: Nomadic Working with NomadBSD 1.0.1 - BSD on a stick
Decision-Making in Self-Management Organizations Using Systemic Consensus -
How to generate a UML diagram using Powershell And GraphViz -
Industries Most and Least Likely to Be Disrupted in 2018 | APMdigest - Application Performance Management
Installing macOS Mojave 10.14 Developer Beta on Proxmox 5.2 – Nicholas Sherlock
Python Lambda script for Cleaning Up unused Amazon EC2 instances | geekdudes
Database Migration Guide – June 2018 updates – Microsoft Data Migration Blog
Windows Incident Response: Coding in DFIR
Probequest - Toolkit For Playing With Wi-Fi Probe Requests - KitPloit - PenTest Tools for your Security Arsenal ☣
My Tactical Advice for Clearing Depression - Daniel Miessler
Chris's Wiki :: blog/linux/LinuxBootOverview
Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast! - Security Boulevard
Can Security be a Business Enabler? – ShiftLeft Blog
A language to speak Dev[Sec]Ops – ShiftLeft Blog
Here are the 2 biggest IT priorities for boards of directors - TechRepublic
To keep pace with digital transformation, boards of directors at many companies are prioritizing cybersecurity skills, and operational risk and compliance. The tech talent shortage is one major barrier to digital transformation success, with security and analytics skills in high demand.
Don't Rely on Long Support Lifecycles · Lindsay Hill
The Zero Trust Model Provides a More Proactive Approach to Security
Group Fines Under the GDPR – Threat Stack
AWS Security Monitoring Checklist - Security Boulevard
Making Sense of Tomorrow’s Cybersecurity Trends
A Totally Tubular Treatise on TRITON and TriStation « A Totally Tubular Treatise on TRITON and TriStation | FireEye Inc
Introducing Gaum: An Open Source O/RM That isn’t an O/RM
How Ransomware Is Changing Cybersecurity and What To Do About It - Security Boulevard
Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty | Radware Blog
Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty - Security Boulevard
What is AWS PCI Compliance? – Threat Stack
What Systems Keep You Effective? - Security Boulevard
CISOs Have an Opportunity to Shine as Regulations Enforce Change, Gartner Says
PCI DSS 3.2.1 FAQs - Security Boulevard
Cybersecurity: Protecting All the Endpoints
Automated SQL Injection Testing of Serverless Functions On a Shoestring Budget (and Some Good Music) - Security Boulevard
Monitoring Data & Data Access to Support Ongoing GDPR Compliance – Part III: Tools - Security Boulevard
Healthcare: Security in Crisis? - Social-Engineer.Com - Professional Social Engineering Training and Services
How to Secure Public Cloud and DevOps? Get Unified Visibility. - Blog | Tenable™
Cyber security - How Threat Hunters Operate in Modern Security EnvironmentsSecurity Affairs
ICS/SCADA Smart Scanning: Discover and Assess IT-Based Systems in Converged IT/OT Environments - Blog | Tenable™
Monitoring VPN Logins & Incorporating them to AD - Syspanda
CISSP CAT Exam Deep Dive: Study Tips from InfoSec Institute Alum Joe Wauson
Cyber Defense e-Magazines – Cyber Defense Magazine
Cybersecurity Framework | NIST
Updated 1.1
Highlights from Verizon DBIR 2018 - Security Boulevard
Identity Governance and Administration (IGA) in IT Infrastructure of Today - Security Boulevard
GitHub - WaterByWind/edgeos-bl-mgmt: Automated updating of EdgeOS firewall network-group to be used as source address blacklist
NBlog - the NoticeBored blog: NBlog June 14 - metrics maturity metric, mmm
Are your Android apps sending unencrypted data? – Naked Security
Back to Basics: Building a Foundation for Cyber Integrity - basics-building-foundation-cyber-integrity-38455
NBlog - the NoticeBored blog: NBlog June 5 - security frameworks
NBlog - the NoticeBored blog: NBlog June 12 - infosec priorities
Florida leads list of states with worst cyber hygiene, New Hampshire the safest
How to become a Linux security expert? - Linux Audit
Bad .Men at .Work. Please Don’t .Click — Krebs on Security
Cybersecurity Reference Architecture: Security for a Hybrid Enterprise – Microsoft Secure
Updating your cybersecurity strategy to enable and accelerate digital transformation – Microsoft Secure
Building Zero Trust networks with Microsoft 365 – Microsoft Secure
The Spamhaus Project - The Top 10 Most Abused TLDs
RDP logs and incident response - Koen Van Impe - vanimpe.eu
DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital Forensics, Malware Analysis, And Network Defense - KitPloit - PenTest Tools for your Security Arsenal ☣
DejaVU - Open Source Deception Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
Why incident response planning is critical for your organisation – IT Governance Blog
Only 24% of organisations consistency apply incident response plans – IT Governance Blog
Wifite 2.1.0 - Automated Wireless Attack Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Namechk - Osint Tool Based On Namechk.Com For Checking Usernames On More Than 100 Websites, Forums And Social Networks - KitPloit - PenTest Tools for your Security Arsenal ☣
Omnibus - Open Source Intelligence Collection, Research, And Artifact Management - KitPloit - PenTest Tools for your Security Arsenal ☣
Omnibus
Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style - KitPloit - PenTest Tools for your Security Arsenal ☣
Rastrea2r
Requirements of a DPO in health and social care – IT Governance Blog
Organisations must invest more in incident response planning – IT Governance Blog
5 ways to become a successful distance learning student – IT Governance Blog
4 tips for incident response management success – IT Governance Blog
What are the Data Subject Rights under the GDPR? – IT Governance Blog
GDPR: lawful bases for processing, with examples – IT Governance Blog
JPCERT/CC Blog: How to Describe Vulnerability Information?
Drone Forensics Gets a Boost With New Data on NIST Website | NIST
Infosecurity.US - Web Log - The First Cyberattack
The 3 Must Knows of Sandboxing
Building a Strong, Intentional and Sustainable Security Culture
4 Cybersecurity Tips for Staying Safe During the World Cup
Implementing appropriate security under the GDPR
How to Protect Your DNS Privacy on Ubuntu 18.04 with DNS over TLS
How not to write your GDPR-'compliant' data protection notice
One-third of healthcare CIOs 'still on the journey' to comply with GDPR privacy rules
Security Ratings Answer Big Questions in Cyber ...
Understanding data processors’ ISO and SOC 2 credentials for GDPR compliance
ISO explained
Facebook, Google Targeted Among 19 Pan-EU Privacy Complaints - Bloomberg
Bash tips for everyday at the command line | Opensource.com
A complete 5G standard is finally here
15 Best Security Podcasts For You
Should the FDA Create a Cybersecurity Measuring Stick?
Linux Privilege Escalation using LD_Preload
Evil Tester: Notes on Shift Left in Testing and Software Development
The L0pht Legacy - The Ethical Hacker Network
Medical Device Cyber Vulnerabilities: More Alerts
How to Use the NIST Cybersecurity Framework - HealthcareInfoSecurity
Congress Considers Ways to Beef Up Healthcare Cybersecurity
Erik Decker
The best free cultural & educational media on the web | Open Culture
Read This Before Signing Up for a Programming or Coding Course!
Using PowerShell to report on thousands of Microsoft SQL Instances & Databases – Virtually Sober
These 10 Security Experts Are Making Your Life More Secure
Neat Odroid & GlusterFS Build Stashes Data, Sips Power | Hackaday
StarWind Free Virtual Tape Library (VTL) | ESX Virtualization
Meet 'Bro': The Best-Kept Secret of Network Security
15 Octave Commands Every Data Scientist Must Know - Big Data Beard
Security metrics you need for the board | CSO Online
Ubunsys - An Advanced System Configuration Utility For Ubuntu Power Users - OSTechNix
Welcome to NTPsec
Open Social Security: Free, Open-Source Social Security Calculator
The GDPR initiative and how it affects US government and industry | CSO Online
Modern Cybersecurity Demands a Different Corporate ...
Security and Privacy Are Not As Different As People Think - Daniel Miessler
Managed Service Providers vs In-House IT Administrators
How to Configure ESXi Unattended Installations: Part 2
What is the New York Cybersecurity Regulation? What you need to do to comply | CSO Online
Generating a docs website powered by Git & Markdown – Karim Vaes
NSE Scripts – More Than Scanning | CQURE Academy
Difference Between Multi-Factor Authentication and Multi-Step Authentication | Alexander's Blog
Integrity and ethics in IT | The IT Skeptic
ODROID-HC2 as an entry-level NAS | Logan Marchione
The Life of Kenneth: Peering with Root DNS Servers
PowerShell Practice Makes Perfect
Look who's coming to Raspberry Fields 2018! - Raspberry Pi
Build your own weather station with our new guide! - Raspberry Pi
Synchronize your watches | Seth's Blog
CrowPi: Raspberry Pi Experimenters Kit Review (With RTL-SDR and RPiTX Tests) - rtl-sdr.com
Working with JSON data in PowerShell – Kory Thacher
App Service Diagnostics – Profiling an ASP.NET Web App on Azure App Service | Azure App Service Team Blog
DSC Resource Kit Release June 2018 | PowerShell Team Blog
joeware – never stop exploring… :) » Blog Archive » Non-Expiring IDs Redux
ITAR Compliance: Guidelines for Companies Dealing with USML
NAT discussions, fact checking, and debate - The Forwarding Plane | The Forwarding Plane
Network Labs Using Nested Virtualization in the Cloud | Open-Source Routing and Network Simulation
Why Automation Matters : Lost Time | The ORACLE-BASE Blog
IT decision makers limit cloud use due to difficulties with compliance
New solution helps secure infrastructure across OT and IT environments
Why Nonprofit Workplaces Are Stressful and What To Do About It | Beth's Blog
What Is a Breadboard and How Does It Work? A Quick Crash Course
Center for Humane Technology
Chotto: A Little Japanese Word with 7 Different Meanings
VMware's Accidental Containerization Hero
Microsoft May 2018 Security Update CredSSP Issue
ADB Exploit Leaves Thousands Of Android Devices Exposed To Attackers
Microsoft and friends need to explain why always-connected PCs make sense
ACPC
Restaurant Style Pasta with Three Cheese Sauce Recipe -- Easy, Gluten Free, and Delicious | Penniless Parenting
The four-percent rule for safe withdrawals during retirement
7 Tips for Issuing an Effective Press Release
Windows Server 2019 What's New - Insider Preview Build 17666 | ESX Virtualization
Want Your Child To Eat (Almost) Everything? There Is A Way : The Salt : NPR
Using KSQL, Apache Kafka, a Raspberry Pi and a software defined radio to find the plane that wakes…
XenServer PowerShell – New Windows VM from ISO | Ask the Architect
Why You Should Use Windows Subsystem for Linux -- Virtualization Review
Hacking When It Counts: The Magnetron Goes to War | Hackaday
Understanding Cosmos DB | James Serra's Blog
Bacula enterprise backup: Review - ITSMDaily.com
A Better Way to Hire & Scale Your Team
AMA: Do You Worry About Your Career? | Don Jones
A third of IT professionals don't know how many endpoints they manage
71 percent of IT pros believe they can hack any organization
DevOps Balanced Scorecard Dashboard | The IT Skeptic
Top Five Ways to Optimize Performance Monitoring (by Keith Bromley)
Is your network provider peered with Microsoft? - Tom Talks
Office 365 Connectivity Guidance – On The Wire
Gartner: Digital Workers Think Management is Out of Touch with Technology | APMdigest - Application Performance Management
Cisco Stacking 2960-X Catalyst Switches | PeteNetLive
The Future Isn’t In Databases, But In the Data - Thomas LaRock
Advanced Standalone Kubelet tutorial for Raspberry Pi - Povilas Versockas
How to find the Windows Experience Index in Windows 10 with Powershell – jasoncoltrin.com
Deployment Research > Research
ZPAQ
GDPR: Continental bans WhatsApp & Snapchat | Born's Tech and Windows World
In Memory Performance, Hyperconverged Simplicity – SAP HANA Validated on Nutanix AHV | Long White Virtual Clouds
Chris's Wiki :: blog/unix/SbrkVersusMmap
Lynis – Automated Security Auditing tool for Linux Servers
Quick tip: Testing volume licensing activation by a KMS | >_
A Quadruple-Provider Vagrant Environment - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Need Help with Oracle Security GDPR Training and Services
Massive Delete | Oracle Scratchpad
Exploring Kubernetes with Kubeadm, Part 1: Introduction - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Half-baked ideas: Server remote management with an RPi Zero | Richard WM Jones
Slow network throughput between Ubiquiti EdgeRouter VLANs - IVOBEERENS.nl
CCNA Training » CCNAv3 – New Questions Part 2
RedEye Ransomware Destroys Your PC Files If Payment Isn't Made
Azure Kubernetes Hackfest - Day 1 - Eric’s Azure Blog
HDD and SSD Maintenance Checklist
ESXi boot fatal error 33 inconsistent data | Adventures in a Virtual World
Explaining your "Why" | Opensource.com
Why You Need To Understand Your Software Supply Chain
Read Ebooks Quicker With This Spritz-Like Fast Reading Command Line Software - Linux Uprising Blog
How this media company became the first to broadcast entirely on Linux | Opensource.com
Five Free Open Source Testing Tools You Can Trust | Information Security Buzz
Standup report: June 8th, 2018 | Will's blog
Homemade Cashew Based Hummus Recipe --- Paleo, Vegan, and Easy | Penniless Parenting
Hummus Recipe
Volume Shadow Copy Service: Overview and Troubleshooting
SAP on AWS – Past, Present, and Future | AWS News Blog
Amazon EKS – Now Generally Available | AWS News Blog
FCC shrugs at fake cell towers around the White House
Using MQTT to send and receive data for your next project | Opensource.com
Citellus: Validate your deployments
Creating a Wildfly cluster for load-balancing in Linux - LinuxTechLab
How to Monitor Apache Performance using Netdata on CentOS 7
Atlanta ransomware attack may cost another $9.5 million to fix
Censorship in the Age of Large Cloud Providers - Lawfare
How Apple Programmer Sal Soghoian Got Apps Talking to Each Other | WIRED
How to Build an Amazon Echo with Raspberry Pi - Make Tech Easier
Open Source Kata Project Improves Security With Virtualized Containers
Data Privacy: Why It Matters and How to Protect Yourself | Linux Journal
An Inside Look at OpenStack Security Efforts
procinfo - Shows System Statistics from /proc Filesystem
A Starter Collection of Blockchain Explainers | DennisKennedy.Blog
The Fifth Anniversary of the Snowden Disclosures - Lawfare
Make a $6 Tiny Portable Weather Station that Transmits Live Data Wherever You Are
18650 control boards
How to dismantle a compiler bomb | Code Explainer
The Importance of Using SIEM for GDPR Compliance - Security Boulevard
CISSP Official Study Guide 8th Edition - What's new
Think You’ve Got Your Credit Freezes Covered? Think Again. — Krebs on Security
NCTUE
Rethinking the “Lessons” of the First World War - Lawfare
Working with Ansible and AWS EC2, SG, ASG and ELB tags - Alex Scoble's IT Notes - An Information Technology Blog
NPM Fails Worldwide With "ERR! 418 I'm a Teapot" Error
Announcing Federal Security and Compliance Controls for Docker Datacenter - Docker Blog
You receive a "logon failure: unknown user name or bad" error message while accessing remote security-enhanced resources from an ASP.NET application
TigerText now TigerConnect | Clinical Communication Solutions
Products · NRS Systems
Binmap: a system scanner
How to: Login to your Microsoft Azure Subscription using Powershell «
How big is the Microsoft Azure Cloud? «
List all VM sizes in Microsoft Azure per Location «
3 Tools for Automating Deployments in the Era of the Modern Hybrid Cloud «
VulnDB
Why there are at least 6,000 vulnerabilities without CVE IDs | Synopsys
Script to Reset WSUS for SysPrep’ed Image – Random Musings of Jeremy Jameson
Adamj Clean-WSUS Powershell Script : sysadmin
Clean Up WSUS the Easy Way - Step by Step
Script Reset WSUS Authorization and get new WSUS SID
Script Reset Windows Update Agent
GitHub - strongdm/comply: Compliance automation framework, focused on SOC2
The State of ICS: One Year Into the Cyber Executive Order
Security: Getting Off the Patch - The Shining Hope - Security Boulevard
SecMon State of the Union: Refreshing Requirements - Security Boulevard
Security: Getting Off the Patch - The Shining Hope
Crashing HDDs by launching an attack with sonic and ultrasonic signalsSecurity Affairs
The Ultimate Guide to CompTIA’s Security+ Certification - Security Boulevard
The Security+ CBK Domains: Information And Updates - Security Boulevard
GDPR Is Affecting the Way WHOIS Works, Security Researchers Worry
What GDPR Compliance means to the IT Security Professional - Security Boulevard
50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts – Threat Stack
Home
Developing GDPR compliant applications, Part 3: Minimizing application privacy risk
Developing GDPR compliant applications, Part 2: Application privacy by design
Developing GDPR compliant applications, Part 1: A developer’s guide to the GDPR
Manage your fleet’s firewalls with osquery | Trail of Bits Blog
Back to basics: What sysadmins must know about logging and monitoring | HPE
The crooked timber of humanity | 1843
Resetting Your Router the Paranoid (=Right) Way - Resetting Your Router the Paranoid (=Right) Way
Binary analysis with Radare2 - Binary analysis with Radare2
Radare2
Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups - KitPloit - PenTest Tools for your Security Arsenal ☣
Prowler - Distributed Network Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages - KitPloit - PenTest Tools for your Security Arsenal ☣
GitHub - trimstray/otseca: Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
What goes in an incident response plan? – IT Governance Blog
5 tips to thwart medical device attacks | CSO Online
Evil Tester: Google Advanced Searches - Google Dorks
How to implement an ISMS aligned with ISO 27001 – IT Governance Blog
PCI DSS compliance made easier – IT Governance Blog
How to Prevent Cloud Configuration Errors
Sysadmin Stories: PowerCLI - Get the sizing of virtual machines
I/O Analyzer
13 tools for checking the security risk of open-source dependencies
Librarians, Meet Your Motherboard » Public Libraries Online
Ready, Set, Negotiate! Preparing for Successful Contract Talks » Public Libraries Online
Observation, Orientation, Decision, Action Applying the OODA Loop Concept to Libraries » Public Libraries Online
Teaching Technology » Public Libraries Online
Windows Server 2012 R2 – Uninstalling .Net Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.71 – the Connector Space
Using the server_stats command on Celerra / VNX File - THE SAN GUY
Gathering performance data on a virtual windows server - THE SAN GUY
Scripting automatic reports for Isilon from the CLI - THE SAN GUY
Meet Aptomi: An application delivery engine for Kubernetes - Superuser
Isilon Port Usage - THE SAN GUY
Default Passwords - THE SAN GUY
Minikube: Try Kubernetes on Windows without headaches – Marksei
Spanning The Tree : Dr Radia Perlman & Untangling Networks | Hackaday
ESXi CLIativity – Part 1 | Adventures in a Virtual World
An inside look at Google’s hiring and onboarding processes
How to Configure ESXi Unattended Installations: Part 1
Counting Bees With A Raspberry Pi | Hackaday
​Red Hat's only business plan is to keep changing plans | ZDNet
Effects of Bring Your Own Device (BYOD) On Cyber Security
Amazon Web Services Networking Overview « ipSpace.net by @ioshints
dbKoda | dbKoda is the open-source, next generation IDE for MongoDB. Take your database to the next level with our Rich Code Editor, Multiple Connection Management and Topology Tree Explorer.
Systematic MongoDB performance tuning – dbKoda – Medium
Introducing SQL Server on Kubernetes - Blog dbi services
Semi-Automatic LaTeX: KDE’s Kile | OCS-Mag
OpenStack Summit Vancouver: Automating the data centre | Ubuntu blog
Kubernetes recipes: Maintenance and troubleshooting - O'Reilly Media
BPFILTER Landing For Linux 4.18 For Eventually Better Firewall / Packet Filtering - Phoronix
Paleo Vegan Tzatziki Recipe -- Mediterranean Yogurt Cucumber Sauce | Penniless Parenting
What is zchunk?
How to Monitor Your Linux Servers Performance with Glances Tool
Red Hat Summit: Building production-ready containers - RHD Blog
10 7zip (File Archive) Command Examples in Linux
Notes On Installing CentOS 7 Server – levlaz
Hewlett Packard Enterprise Grows Compute Business as Private Cloud Opportunities Advance
Microsoft OneDrive for Business Review: Pros and Cons
Building an 90° angular power adapter for the C64 | 0xf8.org
"How much house can I afford?"
Top 5 Consumer Tips for Your Credit Report - Law and Daily Life
Can an Employer Check Your Credit Score? - Law and Daily Life
Nutanix Resiliency – Part 2 – Converting from RF2 to RF3 | CloudXC
Nutanix Resiliency – Part 1 – Node failure rebuild performance | CloudXC
Block Ads & Malvertising on pfSense Using pfBlockerNG (DNSBL) - Linux Included
DNS is Changing. Are you Ready? - DNS is Changing. Are you Ready?
Giving a Presentation? How to Impress Your C-Level Audience
Diskover - File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch - KitPloit - PenTest Tools for your Security Arsenal ☣
How InfoSec Institute Alum Rexson Serrao Earned the World’s Highest CGEIT Score
List of data breaches and cyber attacks in May 2018 – 17,273,571 records leaked – IT Governance Blog
Ten Best Practices for Outsmarting Ransomware
Sia Load Test Wrap-up | Space Duck
Abusing IVR Systems - Legacy Telecom [CVE-2018-11518]Security Affairs
Fortinet Threat Report Reveals an Evolution of Malware to Exploit Cryptocurrencies
“Free” Memory Sticks can be Expensive
Troy Hunt: Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords
USING POWERSHELL TO BACKUP SQLSERVER DATABASES
Don’t Be GDPR Complacent, It’s Time to Get Compliant - Security Boulevard
Does your organisation rely too heavily on technology? – IT Governance Blog
What does a ransomware attack cost? Beware the hidden expenses | CSO Online
A Gorgeous Guide to the First Wave of Personal Computers - Motherboard
Collect NTFS forensic information with osquery - Security Boulevard
Pathways to an Enterprise Security Architecture (ESA) | Security Architects Partners
NBlog - the NoticeBored blog: NBlog May 11 - mind remapped
NBlog - the NoticeBored blog: NBlog May 19 - PRAGMATIC security metrics
NBlog - the NoticeBored blog: NBlog May 25 - GDPR day
Back to Basics: Focus on the First Six CIS Critical Security Controls - basics-focus-first-cis-critical-security-controls-38395
10 Endpoint Security Problems Solved by the Cloud - 10-endpoint-security-problems-solved-cloud-38415
The Untold Story of Japan’s Secret Spy Agency
Completing the vSphere vCenter Appliance Hardening Process | slice2
HOWTO quickly STIG Firefox 59.01 | slice2
ESXi Compatibility Checker
GDPR Hall of Shame
Cybersecurity salaries highest in retail sector
Securing the modern workplace with Microsoft 365 threat protection – part 4 – Microsoft Secure
Securing the modern workplace with Microsoft 365 threat protection – part 3 – Microsoft Secure
Securing the modern workplace with Microsoft 365 threat protection – part 2 – Microsoft Secure
Securing the modern workplace with Microsoft 365 threat protection – part 1 – Microsoft Secure
DHS Cybersecurity Strategy | Homeland Security
Cyberattack map shows impacted U.S. school districts
Fiber Cable | Nbctcp's Weblog
Metta - An Information Security Preparedness Tool To Do Adversarial Simulation - KitPloit - PenTest Tools for your Security Arsenal ☣
[LFCS] Commands to manage and configure containers in Linux – //Cloud notes from my desk
Honeybits - A Simple Tool Designed To Enhance The Effectiveness Of Your Traps By Spreading Breadcrumbs & Honeytokens Across Your Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
FreeRADIUS Server Configuration Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Samurai Email Discovery - Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name - KitPloit - PenTest Tools for your Security Arsenal ☣
Sandmap - A Tool Supporting Network And System Reconnaissance Using The Massive Nmap Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
Open Source Security Podcast
Dumpzilla - Extract All Forensic Interesting Information Of Firefox, Iceweasel And Seamonkey Browsers - KitPloit - PenTest Tools for your Security Arsenal ☣
Security and Human Behavior (SHB 2018) - Schneier on Security
USB Reverse Engineering: Down the rabbit hole | /dev/alias – Hack. Dev. Transcend.
GDPR compliance checklist for healthcare – IT Governance Blog
Business Continuity Awareness Week (BCAW) – Free BCM resources – IT Governance Blog
Galileo - Web Application Audit Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
Archerysec - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
Salt-Scanner - Linux Vulnerability Scanner Based On Salt Open And Vulners Audit API - KitPloit - PenTest Tools for your Security Arsenal ☣
Burpa - A Burp Suite Automation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Where does data flow mapping fit into your GDPR compliance project? – IT Governance Blog
Two Ways To Be A Parent: Insights From The Author Of 'The Gardener And The Carpenter' : Goats and Soda : NPR
Magic Mirror Tirelessly Indulges Children’s Curiousity | Hackaday
Cyber security incidents are becoming more common and harder to resolve – IT Governance Blog
CISO MindMap 2018 – What Do InfoSec Professionals Really Do?Rafeeq Rehman – Personal Blog
Vulnerability Management: So Much More Than Just Patch Management
Deployment Research > Research
From Cambridge Analytica to GDPR: Enter digital supply chain management
HITRUST Unveils Certification for NIST Cybersecurity Framework
HITRUST releases NIST Cybersecurity Framework certification program
Ask the DPO Web Conference Series
The AWS Bucket List for Security
SOC Automation: Good or Evil?
The 13 Step Guide to Secure Your PC After a Fresh Windows Installation [Updated]
Linux Privilege Escalation using Sudo Rights
Healthcare Exchange Standards: Erasure Receipt
Healthcare Exchange Standards: GDPR on FHIR
Smashing Silos and Building Bridges in the ...
US Government Cybersecurity at a Crossroads
Hacking Articles - Raj Chandel's Blog
The Modern Day Hacker – A Cautionary Tale - The Ethical Hacker Network
7 Tools for Stronger IoT Security, Visibility
Get Ready for 'WannaCry 2.0'
What Israel's Elite Defense Force Unit 8200 Can ...
GDPR 101: Keeping Data Safe Throughout the 'Supply ...
A Data Protection Officer's Guide to the Post-GDPR ...
GDPR, WHOIS & the Impact on Merchant Risk Security ...
Clint Boessen's Blog: 432 4.3.2 STOREDRV.Deliver recipient thread limit exceeded
Pi serial adaptor | Facelesstech
Harrowing Story of Installing Libreboot on ThinkPad | Hackaday
Atari co-founder Ted Dabney dies
List of Shark Tank Contestants
11 ways to hack 2FA | CSO Online
Security Report Analysis: 2018 DBIR Report - Daniel Miessler
What SSH Hacking Attempts Look Like – Doug Rickert – Medium
Best certifications to get - The Silicon Underground
LOADays
OWASP DefectDojo Project - OWASP
Linked - IBM bans all removable storage, for all staff, everywhere
GDPR : The good, the good and the good! | The ORACLE-BASE Blog
Computer security principles » Gofore
Brendan Tierney - Oralytics Blog: Creating a Word Cloud using Python
GitHub - rShetty/awesome-podcasts: Collection of awesome podcasts
Decoding and Listening to HD Radio (NRSC-5) with an RTL-SDR - rtl-sdr.com
YouTube Talk: Investigating RF Controls with RTL-SDR - rtl-sdr.com
Naturebytes' weatherproof Pi and camera case - Raspberry Pi
Continued: the answers to your questions for Eben Upton - Raspberry Pi
PR-Holonet: Disaster Area Emergency Comms | Hackaday.io
PR-Holonet
Strengthening cybersecurity for the DoD – accelerating compliance – Azure Government Cloud
Hey DBAs! Powershell is your friend! – Stefano Altamura’s Blog
Windows Server Performance Tuning Guidelines – Brad Chen's SQL Server Blog
Why GDPR is a $3.5 billion business opportunity – Microsoft Partner Network Blog
How to set up a Virtualization Host using KVM on Ubuntu – Marksei
How to Make Windows Speak the Time Out Loud Every Hour
5 Ways to Generate a List of All Installed Programs in Windows
Windows Keyboard Shortcuts 101: The Ultimate Guide
How to Keep Ethernet, TV, and Power Wires Tidy Using Cable Covers
Making Sense of USB-C and Thunderbolt Cables and Ports on Your MacBook
10 Essential Vivaldi Browser Tips & Tricks for Speed and Productivity
The Internet of (Medical) Things: Dangers, Risks, and Security Problems
Why You Should Be Concerned About the EU's New CPC Law
DNS Propagation Checker - ViewDNS.info
Why modernize your datacenter if you are cloud first? | Virtual Me
Passing the AWS Certified Developer – Associate Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert @PSIServicesLLC – vMusketeers
Everything You Need to Know About Raspberry Pi GPIO Pins
The scientific methodology for troubleshooting SharePoint | SharePoint Dragons
Auto-generated infrastructure node graphs from Terraform plans - Skelton Thatcher
A Better Way of Visualizing Microservice Architecture
A free e-learning tool for creating digital content | Opensource.com
Chris's Wiki :: blog/linux/ReplacingNetstatNotBad
15 books for kids who (you want to) love Linux and open source | Opensource.com
FOSS as a Part of a Corporate Sustainability Plan | Linux Journal
Zammad - An Open Source Help Desk and Support Ticket System
8 Policy Changes to Improve Your Business’s Security
GDPR Derogations, ePrivacy, and the Evolving European Privacy Landscape - Lawfare
Sorting Through GDPR: What to Watch After May 25 - Lawfare
BBC - Culture - The 100 stories that shaped the world
Speculative Store Bypass: spectre for browsers, the nightmare isn't over yet – Marksei
Is Training The Enemy of Progress? | The Networking Nerd
Culture Shifts and Work Travel Learnings · Lindsay Hill
Router on a Stick: Intro & Configuration (with lab files) - RouterFreak
Rethinking motivation and engagement in the open organization | Opensource.com
Journal of Azuma Hazuki (5086)
Adding Value to Risk Management Activities With Open Source Tools
Digitizing my DVDs
DOTmed.com - Boston Children's Hospital quickens medical image processing in RedHat and MOC collab
Which Programming Languages Use the Least Electricity? - The New Stack
Debian-goodies - A Set Of Useful Utilities For Debian And Ubuntu Users - OSTechNix
GitHub - tryolabs/luminoth: Deep Learning toolkit for Computer Vision
An FUQ for the GDPR | Linux Journal
How to Run Your Own Git Server | Linux.com | The source for Linux information
How to Install TeamSpeak Server in CentOS 7
Circuit VR: Sink or Swim with Current Sources | Hackaday
Ask Hackaday: Whatever Happened to Wire Wrapping? | Hackaday
Printed Circuits In The Palm Of Your Hand | Hackaday
Printed It: Toolbag Essentials | Hackaday
Harmony Hub Hacked and Patched | Hackaday
Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World « Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World | FireEye Inc
HFT On HF, You Can’t Beat It For Latency | Hackaday
3D Printing Air Quality Study | Hackaday
Getting ready for GDPR with Office 365
7 ways we have improved our core code base
100 percent of organizations have active insider threats
The Electrical Outlet and How It Got That Way | Hackaday
Poor mans Bash Bunny – Cron Blog – My personal findings
Richard Feynman: A Life Of Curiosity And Science | Hackaday
How Hertha Ayrton Enabled the Titanic to Call SOS | Hackaday
Hertha Ayrton
Cloud computing may finally end the productivity paradox
Half of employees not aware of their company's GDPR preparations
Microsoft will roll out 'key' GDPR rights globally... not just in Europe
Chris's Wiki :: blog/tech/DangerousRegistration
Windows Server Status Monitor (Update Version 1.4) – Stick To The Script
Economist Bryan Caplan thinks education is mostly pointless showing off. We test the strength of his case. - 80,000 Hours
UK Decision Makers Unsatisfied with IT Vendor Service | APMdigest - Application Performance Management
How to stay on top of home improvement ~ Get Rich Slowly
Pure//Accelerate 2018 – Thursday General Session – Rough Notes | penguinpunk.net
Sandpits in enterprise data protection » NetWorker Information Hub
Just one more esxi-guy: vSAN Cluster via PowerCli
How-To Create a Training Class Through Ravello Training Platform | ESX Virtualization
pasta salad with roasted carrots and sunflower seed dressing – smitten kitchen
Slacking Away on vSAN — ThinkCharles.net
AsteroidOS and OpenWatch Aim to Open Up Smartwatch Market | Linux.com | The source for Linux information
OpenWatch
Using Stratis to manage Linux storage from the command line | Opensource.com
Zuul - A Project Gating System — Zuul documentation
dbachecks – Save the results to a database for historical reporting | SQL DBA with A Beard
HP 3PAR CLI Reference Guide - THE SAN GUY
Multi-tier load-balancing with Linux | Vincent Bernat
AppDynamics for SAP Released | APMdigest - Application Performance Management
Windows 10: End of Life for several builds | Born's Tech and Windows World
How cool is this: EMC’s Recoverpoint goes INSIDE vSphere!
The Complex Taxation of America’s Retirement Accounts - Tax Foundation
A newbies guide to ELK - Part 4 - Filtering w/ Grok - mwpreston.net
Engage 2018, some HUGE announcements and the OGS Replay
Chris's Wiki :: blog/tech/NoPersonalInfrastructure
Stop wasting time developing SharePoint Training Manuals - SharePoint Maven
Suing to Get a 30-Yr-Old Child Out of Your House - Law and Daily Life
Spotify's GDPR updates add privacy and data download tools
'Japan Sales Mastery:' Lessons from 30 years in Japan - Japan Today
After Meltdown and Spectre, Another Scary Chip Flaw Emerges | WIRED
VeeamON 2018 Recap | TinkerTry IT @ Home
Motivation: Take Advantage Of Being 29, 39, 49, or 59 Years Old — My Money Blog
Windows 10 Upgrade/Servicing tools demoed at MMS 2018 – CCMEXEC.COM – Enterprise Mobility
I am Disappointed in Frontier Communications - Patshead.com Blog
Google and Microsoft unveil Spectre V4 CPU vulnerability | Born's Tech and Windows World
7 Places to Find Free or Cheap Groceries
How to Write a Great Resume as a Business Professional
Intel details fourth Spectre-style CPU security flaw
6 Key Pointers for Running Your Virtual Machine Safely
Training Programs: The Secret to Business Success
Chris's Wiki :: blog/tech/NFSMyMetricsSplit
Analyzing Large Capture Files Part 2 – Protocol Hierarchy – Chris Sanders
PeteNetLive - KB0000515 - VMware - Cannot Cut, Copy, or Paste to and from VM's | PeteNetLive
Windows: Finding Stale User and Computer Accounts | PeteNetLive
Visibility is Security | APMdigest - Application Performance Management
What are Thresholds for Good and Poor Network Packet Loss, Jitter and Round Trip Time for Unified Communications? - Tom Talks
Use Powershell to Get a List of Users with Out of Office enabled in Outlook Office365 – jasoncoltrin.com
Windows Download - #1 Windows ISO Download Source
Generating Good Passwords, Part I | Linux Journal
States and Their Proxies in Cyber Operations - Lawfare
Weekend Reading: Backups | Linux Journal
Speeding Up Netfilter (by Avoiding Netfilter) | Linux Journal
Security and privacy reminder: Spring clean your systems | Opensource.com
‘Crush Them’: An Oral History of the Lawsuit That Upended Silicon Valley - The Ringer
You-Get - A CLI Downloader To Download Media From 80+ Websites
After Four Years, AsteroidOS Open-Source Smartwatch OS Is Ready for the Masses
AsteroidOS
Red Hat Virtualization 4.2 Adds New High-Performance, SDN Features
Fixing Disk Signature Collisions – Mark's Blog
Schedule Task Monitor Script
Why You Need Cloud Data Backup: Cloud Storage Weaknesses Explained
IoT for Managed Service Providers: Challenge or Opportunity?
DSHR's Blog: Prof. James Morris: "One Last Lecture"
Amazon.com: Charles Platt: Books
DeployHappiness | The One and a Half Year Bachelor’s Degree for Less Than Free
19 Things You Should Make Your Kids Pay For
Here Are 11 Reasons We Have An Umbrella Liability Insurance Policy — My Money Blog
Hierarchy of Financial Needs (and the Meaning of Life) | Mad Fientist
Philippines to integrate open-source electronic medical record platform for enhanced health programs | OpenGovAsia
Healthcare Open Source Projects Speed Up Technology Adoption
What Is EVPN? « ipSpace.net by @ioshints
Kickstart Scripted VMware ESXi Install to USB Media – Michelle Laverick…
Configuration vulnerability could leave SAP systems open to compromise
If Facebook had been GDPR compliant would things have been different?
73 percent of industrial networks are vulnerable to hackers
The rise of the experimentation team
How managed services can help businesses with GDPR [Q&A]
Younger generations lack understanding of cybersecurity careers
18 useful financial rules of thumb ~ Get Rich Slowly
How the Father of Computer Science Decoded Nature’s Mysterious Patterns - The New York Times
Ευάγγελος Μπαλάσκας - USBGuard » Evaggelos Balaskas - System Engineer
Terratest - an Open Source Go Library for Automated Infrastructure Testing
Perfect Gluten Free Vanilla Cake Recipe -- Allergy Friendly, Dairy Free, Vegan Option | Penniless Parenting
Ring doorbell flaw lets others watch after password changes (updated)
Securosis - Blog - Article
Introducing vSphere 6.7 Security - VMware vSphere Blog
Cyber Exposure Meets Political Practicality - Blog | Tenable™
How to Secure and Audit an Amazon Web Services Three-tier Web Architecture - Blog | Tenable™
Critical Oracle WebLogic Server Flaw Still Not Patched - Blog | Tenable™
Virtual Instruments Releases VirtualWisdom 5.6 | APMdigest - Application Performance Management
VirtualWisdom
Skype for Business to Microsoft Teams Roadmap Update April 23, 2018, 9 Changes - Tom Talks
The Office 365 train is still steaming along with more than 135 million monthly active users, Microsoft FY18 Q3 Results - Tom Talks
Labeling endpoint actions with Logstash - Threat Hunting - Syspanda
Zero Day Initiative — The May 2018 Security Update Review
What does a CISO actually do? | Thom Langford
State Machine Testing with Echidna | Trail of Bits Blog
Windows Incident Response: EDR Obviates Compliance
Barebone Kickstart setup for CentOS 7 | Velenux Home Page
IT Monitoring Changing in 2018 | APMdigest - Application Performance Management
Catchpoint Releases Free Benchmarking Service | APMdigest - Application Performance Management
The STEM Pipeline: What Can You Do? | Webroot
Importing McAfee ePO Threat events to ELK - Syspanda
Monitoring Active Directory with ELK - Syspanda
VMware PowerCLI - Create Port Groups Script
VMware PowerCLI - Copy Port Groups Script
How to thrive at a technical conference - major.io
The Advent of the Fourth Wave of Computing - Netronome
Why Bare Metal Does Not Have To Be Nude - Netronome
The Case for Express Virtio (XVIO) – Part 2 - Netronome
The Case for Express Virtio (XVIO) – Part 1 - Netronome
Zero-Trust Security for Cloud Data Centers – How Much Does it Cost? - Netronome
Samba login using windows AD on Centos 7 | SvennD
An Updated Look at My Multi-Platform Toolbelt - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
Our preparations for Europe’s new data protection law
Data Collection: How To Gather Meaningful Data - Thomas LaRock
Don't run away from The System, learn to bend it to your advantage - The Matrix has you...
NIST Updates Risk Management Framework to Incorporate Privacy Considerations | NIST
First EU cybersecurity law takes effect—with new fines for misbehaving companies – EURACTIV.com
Is the Irish DPC fit for purpose?
Building A Windows 10 1803 (April 2018 Update) Reference Image with MDT – Stick To The Script
Free stock photos · Pexels
Google outlines GDPR-compliance efforts
Calculating Cloud Cost: 8 Factors to Watch
20 Signs You Are Heading for a Retention Problem
Why GDPR is Every Security Professional’s Dream - Delta Risk
Failure without Consequences after Breach - The Ethical Hacker Network
How to Avoid Bad Clients: 12 Red Flags I Look for to Dodge Nightmare Projects
Google Online Security Blog: Google CTF 2018 is here
'All of Us' Research Project: The Privacy Risks
Is Converging Your IT and OT Networks Putting Your Organization at Risk? | CSO Online
Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance | CSO Online
The rise of the NIST cybersecurity framework | CSO Online
PowerShell mouse jiggler | Logan Marchione
Install Python On Windows With A One-Liner - krypted.com
LasLabs Blog | Storing SSH keys in Active Directory for easy deployment - LasLabs Blog
LasLabs Blog | Managing SSH Keys Stored in Active Directory - LasLabs Blog
The Idiot uses Grafana and Influxdb to monitor Proxmox – Jon Spraggins
Resolved: "Permission denied (publickey)." when trying to access via ssh an Ubuntu Server - Knowledge eXchange
How to store your ssh public key in a different directory - Knowledge eXchange
Deployment Research > Research
Find the repository of all installed packages on Debian or Ubuntu | /contrib/famzah
Time To Get Back To Basics? | The Networking Nerd
Packets over a LAN are all it takes to trigger serious Rowhammer bit flips | Ars Technica
Quick tip: What new products and classifications have been added in the past 30 days to WSUS? | >_
Doc Searls Weblog · GDPR will pop the adtech bubble
Career Certification Strategy – vcdx133.com
vRA Design Considerations – vcdx133.com
VCDX – Exam Techniques – vcdx133.com
Deploying vSphere Virtual Machines using Ansible
vSphere Design Considerations – vcdx133.com
VSAN Maintenance Mode with PowersHell – Michelle Laverick…
MSP Backup Pricing Guide: Tips and Strategies
Red Hat Certification Guide: Overview and Career Paths
5 Awesome Open Source Cloning Software - nixCraft
Spectre, Meltdown made industry collaborate: Red Hat - Security - CRN Australia
A look at open source image recognition technology | Opensource.com
Terraform by HashiCorp
Maximizing Value from Open Source Testing Frameworks - The New Stack
GitHub - axsh/openvdc: Extendable Tiny Datacenter Hypervisor on top of Mesos architecture. Wakame-vdc v2 Project.
OpenVNet
Axsh | Cloud Technology and Network Virtualization
18 Tips & Tricks To Speed Up Windows 10 And Make It Faster
Everything You Need to Know about the Cloud and Cloud Computing, Part I | Linux Journal
How Misinformation Spreads on Social Media—And What To Do About It - Lawfare
Keynote: Crossing the River by Feeling the Stones - Simon Wardley - vNinja.net
VCDX – Throwing Bones – vcdx133.com
VCDX Journey – Part 3 – Design Scenario – vMusketeers
VCDX Journey – Part 2 – Where I Messed It Up – vMusketeers
VCDX Journey – Part 1 – Lessons Learned – vMusketeers
My VCAP-DCV 6.5 exam experience – VCDX6 in the pocket | viktorious.nl – Virtualization & Cloud Management
Performance Checklist now available for vSAN benchmarking - CormacHogan.com
Automate Performance Monitor Statistics Collection for SQL Server and Windows
Finding ESXi iLO/iDrac Information with PowerCLI
Making a little nest for your VMs – Michelle Laverick…
Upgrade Raspbian Jessie to RaspbianStretch | Marco Franssen
10 “Notes to Self” that Will Stop You from Taking Things Personally
RedHunt OS - Virtual Machine For Adversary Emulation And Threat Hunting - KitPloit - PenTest Tools for your Security Arsenal ☣
WSSAT v2.0 - Web Service Security Assessment Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Astra - Automated Security Testing For REST API's - KitPloit - PenTest Tools for your Security Arsenal ☣
hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And Malware Domains - KitPloit - PenTest Tools for your Security Arsenal ☣
Zoom - Automatic & Lightning Fast Wordpress Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
AutoTTP - Automated Tactics Techniques & Procedures - KitPloit - PenTest Tools for your Security Arsenal ☣
New certificate in cybersecurity and data privacy law responds to student demand
1.13M Records Exposed by 110 Healthcare Data Breaches in Q1 2018
How to conduct an ISO 22301-compliant business impact analysis – IT Governance Blog
New criminal hacking group targets healthcare organisations – IT Governance Blog
Companies continue to download faulty software exploited in Equifax breach
GDPR-US-10-things-you-need-to-know-052018_final.pdf
Securing IoT in Healthcare is Critical | CSO Online
What is a Chief Security Officer? Understanding this critical role | CSO Online
Breakout Time: A Critical Key Cyber Metric
Microsoft's Patch Tuesday Fixes Two CVEs Under ...
Some ideas about Oracle Database on Docker - Blog dbi services
Simon Wardley – Strategy by Mapping,Crossing the River by Feeling the Stones — EtherealMind
Person with diabetes finds open source and builds her own medical device | Opensource.com
Equifax confirms data breach included driver's licenses and passports
Security Vendor Sales Pitches and Empty End Point Promises
Security baseline for Windows 10 “April 2018 Update” (v1803) – FINAL – Microsoft Security Guidance blog
First things first: Envisioning your security deployment – Microsoft Secure
The Ransomware Sausage Factory – Do You Really Want To Know How They Got Your Data Back?
What is tar and why does OpenShift Container Application Platform use it? - Red Hat Customer Portal
Understanding the Role of Multi-Stage Detection in a Layered Defense
Different block sizes when you plugin? – Upgrade your Database - NOW!
How to convert/split p12 certificates into single files – – Unixblogger –
Security Trade-Offs in the New EU Privacy Law — Krebs on Security
JPCERT/CC Blog: JPCERT/CC Publishes "Vulnerability Coordination and Disclosure Policy"
NIS Directive and GDPR double jeopardy: Can you be fined twice for the same breach? – IT Governance Blog
Software to support your GDPR compliance project – IT Governance Blog
List of data breaches and cyber attacks in April 2018 – 72,611,721 records leaked – IT Governance Blog
The GDPR and the right to be forgotten – IT Governance Blog
The GDPR: Get a crucial cyber security qualification in one day – IT Governance Blog
Investors must pay closer attention to cyber threats – IT Governance Blog
Infographic: How to comply with the NIS Directive – IT Governance Blog
Securing top management’s approval of your BCMS is crucial – IT Governance Blog
5 things you need to know about CIR management – IT Governance Blog
5 benefits of an ISO 22301-conforming BCMS – IT Governance Blog
The Scottish Cyber Resilience Strategy for health boards – IT Governance Blog
Cyber risk and resilience: A guide for the board and senior management – IT Governance Blog
Cloud service providers and the NIS Directive – are you resilient enough? – IT Governance Blog
(31) APPSEC Cali 2018 - ReproNow - Save time Reproducing and Triaging Security Bugs - YouTube
Ray Ozzie’s plan for unlocking encrypted phones gets a chilly reception | Ars Technica
(31) Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac - YouTube
Is Article 27 the GDPR's 'hidden obligation'?
Massachusetts Senate passes data breach bill regulating consumer reporting agencies
Store 6000+ Records & Breach Costs Will Exceed Security Investment: Report - Infosecurity Magazine
What's the future hold for US health care privacy regulation?
​Equifax has spent $242.7 million on its data breach so far | ZDNet
Companies launch open-source GDPR framework for DSARs
Recent Ransomware Incidents Serve Up Lessons - HealthcareInfoSecurity
FDA Unveils Plan for ‘Software as a Medical Device’ Review
The Best Strategy for Cyber-Conflict May Not Be a Cyber-Strategy
(31) APPSEC Cali 2018 - Closing Keynote - Digital Disease: How Healthcare Cybersecurity Challenges... - YouTube
Infosecurity.US - Web Log - QOTD Esther Dyson
GDPR Is Coming. Is Your Organization Ready?
PyRoMine Malware Sets Security Industry on Fire
5 Top Cybersecurity Themes at RSA 2018 - HealthcareInfoSecurity
How Triton Malware Targets Industrial Control Systems
Is Payments Industry Ready for New Encryption Protocols?
SamSam Ransomware Offers Volume Decryption Discount
Certain Becton Dickinson Products at Risk for 'KRACK' Flaw
How Authentication Must Evolve in the Age of GDPR
Former Physician Convicted of Criminal HIPAA Violation
The Biggest “Small” Personal Digital Security Mistakes – tisiphone.net
Texas Hospital CEOs: Cybersecurity Is No. 1 Worry
Multitouch 'skin' makes your body the controller
Lesley on Brakeing Down Incident Response Podcast – All About Playbooks – tisiphone.net
Finally, a free open-source database for all Canadian startup information | Financial Post
USB Device Tracking using the Partition/Diagnostic Event Log - Digital Forensics Stream
Every Business Needs a Vulnerability Disclosure Policy. Every. Single. Business. - The Ethical Hacker Network
Why Am I Getting All These Terms of Service Update Emails? | Electronic Frontier Foundation
Bring in the Nerds: EFF Introduces Actual Encryption Experts to U.S. Senate Staff | Electronic Frontier Foundation
Building a freedom-based photography community | Opensource.com
Spicy Garlicky Stir Fried Eggplant Recipe -- Paleo, Vegan, and Easy | Penniless Parenting
There is No Middle Ground on Encryption | Electronic Frontier Foundation
WEBCAST: Web App Assessments for Non-Majors - Black Hills Information Security
Analyzing Large Capture Files Part 1 – Colorizing Conversations in Wireshark – Chris Sanders
'Zero Login:' The Rise of Invisible Identity
Sarah Squire
3 Ways to Maximize Security and Minimize Business ...
GDPR Requirements Prompt New Approach to Protecting ...
Ransomware Attacks Jumped 400% Worldwide in 2017
Automation Exacerbates Cybersecurity Skills Gap
What Meltdown and Spectre Mean for Mobile Device ...
Encryption is Necessary, Tools and Tips Make It Easier
Spectre Returns with 8 New Variants
5 Ways to Better Use Data in Security
Calling all open source advocates: join the GPL Cooperation Commitment
Going through the 7 stages of GDPR | CSO Online
Best security software, 2018: How 9 cutting-edge tools tackle threats | CSO Online
GDPR-defined personal data can be hard to find—here's where to look | CSO Online
China increases employee surveillance, creating its own Thought Police | CSO Online
Branding infosec: Why security should consider its own internal advertising campaign | CSO Online
Can Shadow IT Be Good for Enterprises? | CSO Online
Updates to Ansible Playbook for Usenet Docker containers | Calvin Bui
Cybersecurity Tech Accord
Cyberwar: Silicon Valley’s new bright, shiny thing | CSO Online
Why securing containers and microservices is a challenge | CSO Online
Conway's Law: does your organization’s structure make software security even harder? | CSO Online
What is cyber resilience? Building cybersecurity shock absorbers for the enterprise | CSO Online
Adopt the NIST cybersecurity framework (CSF) and harness the wisdom of crowds | CSO Online
Insuring Uncle Sam’s cyber risk | CSO Online
Starting and Stopping Azure Virtual Machines Using Azure PowerShell
vCenter Service Appliance 6.7 Tips and Tricks | Virten.net
Berkshire Hathaway Shareholder Meeting Full Videos, Transcripts, and Podcasts — My Money Blog
About updating inbox PowerShell modules | >_
Spectre-NG: Security bods uncover eight new 'Spectre-class' flaws in Intel CPUs
Yale Scientists Found 'Time Crystal' In The Unlikeliest Place
US elevates the role of Cyber Command
Chinese spies linked to decade-long hacking campaign
Solved: DNS Forwarding 100K+ Entries - Ubiquiti Networks Community
Should a SaaS provider open source its primary platform? | Opensource.com
NHS will upgrade all systems to Windows 10 following WannaCry outbreak
Rob Shaw, Deputy Chief Executive
Welcome to brigade’s documentation! — brigade 0.0.1 documentation
Dell Technologies World 2018 – storage.12 – XtremIO X2: An Architectural Deep Dive Notes | penguinpunk.net
StarEast, InteropITX and GDPR - DBA Kevlar
Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 2 - Blog dbi services
SQL Server Security: Are your databases ready for the GDPR? - Blog dbi services
On the Myth of the 10X Engineer and the Reality of the Distinguished Engineer – Charting Stacks
Cloud Not Just Someone Else's Computer · Lindsay Hill
Testing VSAN 6.7 network outages on Ravello is easy! – vMusketeers
To Be a 10x Engineer, or Not to Be - IOD: [tech.content]
10X Engineers - Quora
Dell Technologies World 2018 – Dell EMC Announces PowerMax | penguinpunk.net
What’s The Buzz About StorageOS? | penguinpunk.net
We Have to Learn How to Manage the Cattle « ipSpace.net by @ioshints
Qucs project: Quite Universal Circuit Simulator
Introducing zchunk
Working around Intel Hardware Flaws | Linux Journal
This Russian Company Sells Zero-Day Exploits for Hospital Software - Motherboard
De-Googling my phone · Martin Pitt
A brief history of bad passwords | Opensource.com
Open Source Password Management Solutions | Bitwarden
GitHub - google/gvisor: Container Runtime Sandbox
May 2018 Issue: Privacy | Linux Journal
Privacy Is Still Personal | Linux Journal
Weekend Reading: Qubes | Linux Journal
The GDPR Takes Open Source to the Next Level | Linux Journal
Where is serverless computing headed? | Opensource.com
What is Windows 10 Timeline? How To Use It Like A Pro?
POWERCFG: How To Check Battery Health Report And Energy Report In Windows Using CMD
How to Install and Configure Redis on Ubuntu 18.04 and Speed Up WordPress Using Redis Caching | Dotlayer
A Bash Script to Create a Bootable USB from ISO in Linux
How to Install BookStack Documentation Wiki on CentOS 7
Is it Time to Regulate Cyber Conflicts? - Lawfare
What works best Clean Install or Dirty Upgrade?: VMware ESXi Upgrade on HP ML350e Gen8 – Michelle Laverick…
DELL N4032 / HP HP ProCurve Switch 2810 / Juniper SRX 300 cheat sheet – Laurent Domb OSS Blog (RHCA, AWS SAA,ITIL, eMBA)
Qemu now supports the HPPA in softmmu mode! | Virtually Fun
What's New in vSphere 6.7? Should I Upgrade?
Managed Services Market Trends to be Aware of in 2018
How to Create a Business Project When It's Your College Homework
VCSA 6.5 AD Lookup Issues #DNS #DIG #VMware #vExpert #VCSA #vCenter – vMusketeers
vSphere 6.7 – Let’s break it down! - VirtuallyInclined.com
Sysadmin Stories: PowerCLI - Batch migrate VM network adapter
Incremental vs Differential Backup: Difference Explained
Technology Short Take 98 - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
3 questions about Kata Containers answered | Opensource.com
Automating Labs…Now With YAML and Multi-Threading! – neckercube.com
CCNA Training » GRE Tunnel Tutorial
Things to do after installing Ubuntu 18.04 Bionic Beaver Linux - LinuxConfig.org
Overview on Android x86 Project & Call to Help – FOSS Post
A look at Peek screen recorder for GNU/Linux - gHacks Tech News
Timeshift review - Let's do the time warp again
Red Hat Launches All-In-One Data Center Storage Solution
Weekend Reading: Privacy | Linux Journal
Researchers Spent 10 Years Creating This "Master Key" To Unlock Millions Of Hotel Rooms
How to randomize DNS resolver selection in Knot Resolver – Ctrl blog
Zero D’Eh: Canada Takes a Bold Step Towards Offensive Cyber Operations - Lawfare
The best and worst laptop brands 2018
StorageNewsletter » Daily Breaking News for the Worldwide IT Storage Industry
New IRS Data Shows Most IRA Contributions Were Made by Middle-Class Taxpayers - Tax Foundation
Social media has a censorship problem of its own making
The perfect is the enemy of the good ~ Get Rich Slowly
OpenDedup – Opensource Dedupe to Cloud and Local Storage
Zenko - Scality’s Open Source Multi-Cloud Data Controller
Non-Malware Attacks: What They Are and How to Protect Against Them?
Why Hackers Love Healthcare
Recent BA Ransomware Incidents Serve Up Lessons
TECH-T08-It's-Time-to-Kill-the-Pentest.pdf
5 signs you've been hit with an advanced persistent threat (APT) | CSO Online
Atlanta's recovery highlights the costly mistake of being unprepared | CSO Online
Why does your most important database run on Oracle 10.2.0.4?
Oracle Fusion Middleware Infrastructure 12.2.1.2.0 - Probable Incorrect Firewall Configuration - Blog dbi services
If You're Not Doing Continuous Asset Management You're Not Doing Security
NBlog - the NoticeBored blog: NBlog April 24 - privacy policies under GDPR [UPDATED]
One month out: Top 6 steps for GDPR compliance
9 steps to implementing ISO 27001 – IT Governance Blog
Risk Analysis Requirement Survives ‘Meaningful Use’ Revamp
GDPR compliance in a nutshell | CSO Online
All About Versions – Time to Upgrade? | ThatJeffSmith
How This Artist Finds Abstract Art in Footage of Nuclear Explosions - Motherboard
How to Use Sensu and RabbitMQ on Ubuntu to Monitor Your WordPress Website | Sitety
How to Install Log.io Realtime Log Monitoring Tool on Ubuntu 16.04 LTS
[Howto] Using Ansible to manage RHEL 5 systems – /home/liquidat
Health care data breaches included in Arizona's new notification law
MalPipe - Malware/IOC Ingestion And Processing Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
TR Center - Man in the Arena
A closer look at the GDPR’s technical requirements – IT Governance Blog
Reading The F****** Manual: Setting Up VMware PowerCLI 10.x – Michelle Laverick…
A simple Pivotal Container Service (PKS) deployment - CormacHogan.com
Cilium 1.0: Bringing the BPF Revolution to Kubernetes Networking and Security — Cilium
BPF, eBPF, XDP and Bpfilter… What are these things and what do they mean for the enterprise? - Netronome
Chris's Wiki :: blog/linux/HiDPILinuxHassles
Cookiescanner - Tool For Check The Cookie Flag In Multiple Sites - KitPloit - PenTest Tools for your Security Arsenal ☣
5 steps to an effective ISO 27001 risk assessment – IT Governance Blog
A catastrophic cyber attack is imminent, says UK government – IT Governance Blog
Why you shouldn’t ignore the NIS Directive – IT Governance Blog
Passing the AWS Certified Solutions Architect – Associate Exam 2018 Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert – vMusketeers
Patching my databases with the April 2018 PSU, BP and RU
Insider Threat: Putting Theory Into Practice - HealthcareInfoSecurity
Why is the kernel community replacing iptables with BPF? — Cilium
Spectre and Meltdown's Critical Impact on Cloud Providers and Customers
Quick Take-Aways From the RSA Security Conference | CSO Online
Total Meltdown (not Meltdown!) exploit now available @ AskWoody
Windows Privilege Escalation - Unquoted Services - The Ethical Hacker Network
Just solve the problem! ~ Get Rich Slowly
www.moosecon.com
Infrastructure Hardening · Veeam Backup & Replication Best Practices
Tom Sneddon's stuff
Batch Script Tutorial
Android-x86 - Porting Android to x86
GitHub - joaomatosf/jexboss: JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
DosTips - The DOS Batch Guide
Francis Lam's Weapons-Grade Ratatouille | The Splendid Table
GDPR kills the American internet: Long live the internet!
VMware Product Interoperability Matrices for VMware vSphere Hypervisor (ESXi) | TinkerTry IT @ Home
Making Use Of The search Option In resolv.conf
Aaron Toponce : Use A Good Password Generator
The Difference Between URLs and URIs
Giving social networking back to you - The Mastodon Project
Unable to login because of a ESXi root account lockout - IVOBEERENS.nl
What to know about Spectre and Meltdown with VMware environments - IVOBEERENS.nl
Conversation Intelligence Technology for Sales Teams | Gong.io
GitHub - BloodHoundAD/BloodHound: Six Degrees of Domain Admin
Scanning and Patch Auditing VMware Using Nessus - Blog | Tenable™
Security Orchestration and Automation for Security Operations | Rapid7
GitHub - nccgroup/Scout2: Security auditing tool for AWS environments
Open Source Management and Monitoring System for Ceph | openATTIC
Index of /
Including OWASP ModSecurity Core Rule Set – Welcome to netnea
The Working Centre
Introducing Mastermind: Powerful and Simple Deployment, Scaling, Load Balancing and Testing of Applications in the Cloud – Microsoft Faculty Connection
OH2BNF's Plan for a Large Scale Raspberry SDR (LSR-SDR) Based on RTL-SDR Dongles - rtl-sdr.com
Life On Contract: Lowering Your Cost without Dropping Your Price | Hackaday
5 Things You Have to Know About the Dangers of Ransomware
The 3 Best Ways to Scan Your Old Photos (And Why You Should)
Learn About Cybersecurity with These 11 Essential Videos
7 Types of Ransomware That Will Take You by Surprise
When Hackerspace Directors Burn Out | Hackaday
GDPR Data Discovery On Tap from Raz-Lee - IT Jungle
A lesson in wireless engineering from the Raspberry Pi
Security Patches: Move Faster to Keep Up With the Bad Guys - Security Boulevard
2018 Phishing Trends & Intelligence Report: The Shift to Enterprise - Security Boulevard
20 Critical Security Controls: Control 7 – Email and Web Browser Protections - Security Boulevard
What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders | CSO Online
Using Rubber Ducky To Steal Encrypted Data | CQURE Academy
Ransomware (with Allan Liska & Tim Gallo) - Advanced Persistent Security
NSA reveals how it beats 0-days – Naked Security
20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs - Security Boulevard
OWASP APPSEC Cali 2018, Anthony Trummer's 'European Vacation: Leveraging GDPR For Security' - Security Boulevard
Technology for GDPR Compliance: Turning Plans into Action - Security Boulevard
Why Cyber-Security Is Critical to The Loyalty of Your Most Valued Customers - Security Boulevard
What Harm Can Come From Missing 59,000 Vulnerabilities?
Doing OSINT and Twitter Analytics with Tinfoleak - Koen Van Impe - vanimpe.eu
SMBrute - SMB Protocol Bruteforce - KitPloit - PenTest Tools for your Security Arsenal ☣
RTA (Red Team Arsenal) - An Intelligent Scanner To Detect Security Vulnerabilities In Companies Layer 7 Assets - KitPloit - PenTest Tools for your Security Arsenal ☣
How to write a GDPR-compliant personal data breach notification procedure – IT Governance Blog
Keep your professional services firm’s papers under wraps for GDPR compliance – IT Governance Blog
MPs agree there is a “long way to go” to bring cyber security up to standard in the NHS – IT Governance Blog
FDA Proposes Action to Enhance Medical Device Cybersecurity
CYMSAB
Countdown to GDPR: Part 2 — Opportunities and challenges
How To Start Taking Control Of Your Data - Essential Privacy Tools
A brief guide to cyber security risk assessments – IT Governance Blog
GRC Evolves Into Integrated Risk Management - HealthcareInfoSecurity
Abbott Issues Software Patches for More Cardiac Devices
What Came First: VLANs or VRFs? « ipSpace.net by @ioshints
Chris's Wiki :: blog/solaris/ZFSWhyIOInRecordsize
UUID of hard disk | SvennD
Installing and Configuring Windows Server Update Services with Windows Server 2016 Core – Stick To The Script
Self-hosted videos with HLS | Vincent Bernat
GDPR Scope Queries for Oracle E-Business Suite | Integrigy
How to recycle your used and unwanted gadgets
FDA Proposes Action to Enhance Medical Device Cybersecurity
This Japanese Budgeting System Could Be the Key to Saving Big Bucks
kakeibo
How to be happy and lead a meaningful life ~ Get Rich Slowly
How will the GDPR impact open source communities? | Opensource.com
Backup And Restore Application Settings On Newly Installed Linux System - OSTechNix
Failure to automate: 3 ways it costs you | The Enterprisers Project
Richard Stallman, RMS, on Privacy, Data, and Free Software
Privacy as an Afterthought: ICANN's Response to the GDPR | Electronic Frontier Foundation
Create Dynamic Wallpaper with a Bash Script | Linux Journal
Life After WannaCry's Wake-Up Call: What's Next?
Health Data Breach Tally Spikes in Recent Weeks
The Agony and the Ecstasy of Cloud Billing | Linux Journal
Running Jenkins builds in containers | Opensource.com
The IoT Hacker's Toolkit · System Overlord
How to build confidence (and destroy fear)
Firewall Management Software | Network Security Monitoring
Application Risk Module - Kenna Security
Zero Trust Security Model | Alexander's Blog
GDPR and client-side tools
Tips and Tricks for Detecting Insider Threats
Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis - KitPloit - PenTest Tools for your Security Arsenal ☣
Healthcare Exchange Standards: IHE Perspective on EU GDPR
PowerShell Script to Monitor Active Directory Health | Alexander's Blog
Mesos and Marathon REST API via cURL - A Hello World Example
Testing the Hetzner Cloud API via cURL - IaaS Automation -
DICOM Library - Anonymize, Share, View DICOM files ONLINE
DICOM Library - Anonymize, Share, View DICOM files ONLINE
IT Automation Part III: Saltstack "Hello World" Example -
IT Automation Part II: Ansible "Hello World" for Templating -
IT Automation Part I: Ansible "Hello World" Example using Ansible on Docker -
GitHub - ubeeri/Invoke-UserSimulator: Simulates common user behaviour on local and remote Windows hosts.
Finding purpose: 12 exercises to help you discover purpose and passion
ICND1 & ICND2 » ICND1 – VLAN Questions
ICND1 & ICND2 » ICND2 – OSPF Questions 4
ICND1 & ICND2 » ICND2 – OSPF Questions 3
ICND1 & ICND2 » ICND2 – OSPF Questions 2
ICND1 & ICND2 » ICND2 – OSPF Questions
Cisco and System Security Basics: Learning By Doing: Challenges
ICND1 & ICND2 » ICND2 – InterVLAN Questions
ICND1 & ICND2 » ICND2 – RSTP Questions 2
ICND1 & ICND2 » ICND2 – STP Questions 2
ICND1 & ICND2 » ICND2 – STP Questions
Cisco and System Security Basics: CDP: Building Topology Diagram
Cisco and System Security Basics: Cheap Hacker's Lab
Cisco and System Security Basics: Passive Reconnaissance - Flowers in Corp Web Page
Order of Precedence when Configuring ASP.NET Core – Premier Developer
Cisco and System Security Basics: Cisco: Beginner Level
Cyber Defense | PowerShell Script to Block Cortana for Privacy | SANS Institute
Weekly Cyber Risk Roundup: Orbitz Breach, Facebook Privacy Fallout - Security Boulevard
6 practices for super smooth Ansible experience by Maxim Chernyak
Vagrant - Complex Vagrantfile Configurations - EverythingShouldBeVirtual
The Anatomy of an Instant Clone - VMware Blogs
Getting Started With Vagrant
Configuration - VirtualBox Provider - Vagrant by HashiCorp
Migration and Disaster Recovery in the Oracle Cloud with Rackware | Oracle Cloud Infrastructure Blog
How to Disable, Uninstall or Reinstall OneDrive in Windows 10
Tap Drill Sizes
Protecting routers and other network equipment
GDPR 'Murica! - DBA Kevlar
Linux 101 for SQL Server DBAs, Part II - DBA Kevlar
SQL Server Operations Studio - DBA Kevlar
GDPR Solutions in the Day of Automation - DBA Kevlar
Hadoop Architecture | HDFS Architecture | HDFS Tutorial | Hadoop Tutorial – DBA Tutorials
ISO/IEC 27001 and Why It Matters for Your Business
When Your Greatest Cybersecurity Doubters Are in the C-Suite - Security Boulevard
20 Critical Security Controls: Control 10 - Data Recovery Capabilities
A week in security (April 02 – April 08) - Security Boulevard
The Future of GPOs - JumpCloud
MY TAKE: A breakdown of why Spectre, Meltdown signal a coming wave of ‘microcode’ attacks - Security Boulevard
What do you wish osquery could do? - Security Boulevard
OPM provides guidance to address cybersecurity skills gap - Security Boulevard
Netsparker Surveys US Based C-Levels on GDPR Compliance - Security Boulevard
Efficiently Testing Pipelined Microservices - Security Boulevard
Infrastructure-as-Code: Project Update - Virtual Elephant
Oracle Instance – Prakash Blog
GROW THAT DBA CAREER – Prakash Blog
Infrastructure-as-Code: Project Overview - Virtual Elephant
Infrastructure-as-Code: Bootstrap CoreOS with Ignition - Virtual Elephant
Infrastructure-as-Code: Understanding CoreOS Ignition - Virtual Elephant
Infrastructure-as-Code: Getting started with Ansible - Virtual Elephant
Infrastructure-as-Code: Ansible for VMware NSX - Virtual Elephant
VCDX Quick Hit - Monitoring and Alerting - Virtual Elephant
Docker for Ansible + VMware NSX Automation - Virtual Elephant
Enhanced NSX Modules for Ansible - Virtual Elephant
oVirt hosted engine with zfs storage - My Wired House
Manage SCCM configuration items and baselines with community tools – 4sysops
Tailing the Alert Log with SQLcl | ThatJeffSmith
A Place to Learn Oracle, No Setup Required | ThatJeffSmith
UK GCHQ director confirmed major cyberattack on Islamic StateSecurity Affairs
JeremyFleming
“Need to Know” for Oracle DBA Begineers – Prakash Blog
The DBA works at the intersection of the database, server, operations group, and developers. A DBA must understand concepts from all these facets of IT as well as be able to draw upon knowledge of their production environment to troubleshoot performance, hardware, and software issues.
RAC Notes Scanned Documents – Prakash Blog
Database Authentication with a Smart Card – Part 3 | Late Night Oracle Blog
Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 1 - Blog dbi services
Oracle Backup and Recovery Solutions – Prakash Blog
SOLVED: Application Data.. repeating recursion | Wordlinks' Blog
Disable or Uninstall OneDrive Completely in Windows 10 - Tech Journey
20 Ways to Increase the Efficiency of the Incident ...
As Businesses Rush to Comply with GDPR, Some Face Costs of over $1 Million - Security Boulevard
Tenable Research Advisory: AXIS Camera App Malicious Package Distribution Weakness - Blog | Tenable™
Zuckerberg Unveils the Cyber-Naivete of Congress - Security Boulevard
Best Buy the Latest Victim of Third-Party Security ...
A Nonverbal Analysis of Mark Zuckerberg’s Congress Testimony - Social-Engineer.Com - Professional Social Engineering Training and Services
Are your Android devices updated? Researchers say maybe noSecurity Affairs
Security Affairs newsletter Round 157 – News of the weekSecurity Affairs
The Real Industry Behind Fake Electronics - Motherboard
Vigilante hackers strike Russia and Iran Networks exploiting Cisco CVE-2018-0171 flawSecurity Affairs
Pairing Policy & Technology: BYOD That Works for ...
Slideshows - Dark Reading
Avoiding the Ransomware Mistakes that Crippled ...
7 Steps to a Smooth, Secure Cloud Transition
7 Non-Financial Data Types to Secure
Businesses Calculate Cost of GDPR as Deadline Looms
Video: MDT 2013 log files basics (bdd.log and smsts.log) | Keith's Consulting Blog
Basic Usage - Provisioning - Vagrant by HashiCorp
GitHub - Or3stis/apparatus: A graphical security analysis tool for IoT networks
ASTo - An IoT Network Security Analysis Tool and Visualizer - KitPloit - PenTest Tools for your Security Arsenal ☣
APNIC Labs enters into a Research Agreement with Cloudflare | blabs.apnic.net
The Art of Soldering - Motherboard
Atlanta, Colorado DOT ransomware mitigation costing millions
Journey Into Incident Response: Process Hollowing Meets Cuckoo Sandbox
Journey Into Incident Response: Making Incident Response a Security Program Enabler
Journey Into Incident Response: Introducing the Active Threat Search
Journey Into Incident Response: Security Monitoring with Attack Behavior Based Signatures
Journey Into Incident Response: Triage Practical Solution – Malware Event – Proxy Logs Prefetch $MFT IDS
GitHub - infobyte/faraday: Collaborative Penetration Test and Vulnerability Management Platform
How GDPR could impact US health care providers
Security baselines should underpin efforts to manage cybersecurity risk across sectors – Microsoft Secure
Building a Successful Security Operations Center (SOC): Part 4Rafeeq Rehman – Personal Blog
Vulnerability Assessment | Detect Vulnerabilities in Binaries via Hash Lookup
Microsoft to deliver new products and strategies for security innovation at 2018 RSA Conference – Microsoft Secure
Why the cyber security skills gap is so damaging – IT Governance Blog
How are the C-Suite failing cyber security? – IT Governance Blog
10 key areas to identify gaps in your GDPR compliance – IT Governance Blog
Why ISO 27001 is integral to data protection compliance – IT Governance Blog
The GDPR: What technical measures do you need to conduct? – IT Governance Blog
Healthcare Exchange Standards: IHE on FHIR tutorial
Healthcare Exchange Standards: De-Duplicating the received duplicate data
2018 Data Breach Investigations Report | Verizon Enterprise Solutions
2018-02.pdf
GitHub - XalfiE/Nix-Auditor: Nix Audit made easier (RHEL, CentOS)
The Impact of All 50 States Having Breach Notification Laws
Trusted insider at the federal level raises concerns | CSO Online
Imran Awan
Facebook's Zuckerberg Pledges Worldwide GDPR Compliance
Sep 2011 - C_inaday-NL-ISACA-Erik-van-Eeeden-Cobit.pdf
WSUS Automated Maintenance (Formerly Adamj Clean-WSUS) - Script Center - Spiceworks
The CISO as an Internal Security Evangelist - HealthcareInfoSecurity
How to setup SOC using open-source tools – Sath
Healthcare Data Management | Commvault
VMware Storage IO Control (SIOC) Overview
Open Security Operations Center
On Old Configs and Automation | The Networking Nerd
Mind Map for CCIE & CCNP Routing & Switching – neckercube.com
Mellanox, Ixia and Cumulus: Part 3 - MovingPackets.net
Mellanox, Ixia and Cumulus: Part 2 - MovingPackets.net
Mellanox, Ixia and Cumulus: Part 1 - MovingPackets.net
Container Security through Segregation « ipSpace.net by @ioshints
The Death Of Expertise
Security baseline for Windows 10 (v1511, "Threshold 2") — FINAL – Microsoft Security Guidance blog
Article: Using Secedit To Apply Security Templates | ITNinja
Infront Consulting Group - Microsoft IT solutions and software
Business Intelligence and Big Data Analytics Softwa
high performance WAF platform with Naxsi and HAProxy - HAProxy Technologies
Configuring Apache in front of JBoss Application Server Using mod_jk
The answers to your questions for Eben Upton - Raspberry Pi
Explaining and Demonstrating Jam and Replay Attacks on Keyless Entry Systems with RTL-SDR, RPiTX and a Yardstick One - rtl-sdr.com
How to clean a circuit board - The Silicon Underground
Kubernetes 1.10 Released - via @codeship | via @codeship
Looking inside a .NET core process using windbg – Rohith's blog
Compare two text files with PowerShell – neo
Ramping up on Powershell & CLI – Premier Developer
The Japanese Calendar’s Y2K Moment – I'm not a Klingon ( )
Cooking for Beginners: 5 Essential Sites for Newbies in the Kitchen
DSHR's Blog: Natural Redundancy
The Raspberry Pi 3B+ As An SDR – Without The SDR! | Hackaday
A comprehensive guide to Docker Networking – Marksei
The Bootup Baseline (by Tony Fortunato)
Deployment Research > Research
Lawmakers want more tech companies to address privacy legislation
Katello: Create a Domain, Subnet, Installation Media, OS, Provisioning Templates, Host Groups, PXE Boot | Lisenet.com :: Linux | Security | Networking
50 State Infographic: How Much Income Do You Need to Afford the Average Home? — My Money Blog
Automating 4,000 Microsoft SQL Databases with Rubrik, REST APIs, and PowerShell – Virtually Sober
AWS Online Tech Talks – April & Early May 2018 | AWS News Blog
How to create vSphere VMs with RDM disks
Tackling L33t-Speak | Linux Journal
Agedu - A Useful Tool for Tracking Down Wasted Disk Space in Linux
Simple Cloud Hardening | Linux Journal
Blockchain, Part I: Introduction and Cryptocurrency | Linux Journal
Weekend Reading: Sysadmin 101 | Linux Journal
20 Outstanding Backup Utilities for Linux Systems in 2018
How Wizards and Muggles Break Free from the Matrix | Linux Journal
Install an OpenStack cloud with Jenkins | Opensource.com
Laverna - keep your notes private
Capsule8 - Zero-day attack detection for modern Linux environments
How to Boot Debian 9 ISO File Directly From Hard Drive With GRUB2
42 Books That Will Make You A Better Person (Each Described In 1 Sentence) | RyanHoliday.net
A Google Cloud Platform Primer with Security Fundamentals
6 Steps for GDPR Readiness
20 Critical Security Controls: Control 16 - Account Monitoring and Control
What is Virtual Hardening for Websites? Read all about it.
20 Critical Security Controls: Control 17 – Implement a Security Awareness and Training Program - Security Boulevard
Improved Cybersecurity Measures for Better Organizations | Netswitch Technology ManagementNetswitch Technology Management
Web Application Firewalls: The Definitive Primer - Security Boulevard
10 Best Practices for Mobile App Penetration Testing
20 Critical Security Controls: Control 15 - Wireless Access Control
Establishing a Global Security Operations Center (GSOC) - Security Boulevard
GDPR Countdown Checklist: 3 Strategic To-Do’s for Cybersecurity Teams - Security Boulevard
Why Enterprises Should Control Their Encryption Keys - Security Boulevard
It’s Complicated - Operational Security for Developers - Security Boulevard
Burp Suite continuing the Saga - Security Boulevard
SamSam Ransomware: How to Identify and Mitigate the Risk - Security Boulevard
Real-Time Analytics for PCI Compliance - Security Boulevard
Annual Report Shows Increased Maturity in Security Operations - Security Boulevard
SAP HANA Pentesting. Part 1: Vulnerabilities history
SecurityEverAfter 2018-03-29 21:17:00 - Security Boulevard
3 Payloads in Healthcare Data Breaches - Security Boulevard
20 Critical Security Controls: Control 12 - Boundary Defense
OWASP APPSEC Cali 2018, Josh Sokol's 'Architecting for Security in the Cloud' - Security Boulevard
Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk - Security Boulevard
RAVELLO: Troubleshooting VSAN Network connectivity issues – vMusketeers
VMware Specialist: vSAN – Objective 2.2 – Describe vSAN Requirements - thecloudxpert
Nexenta Announces NexentaCloud | penguinpunk.net
DBeaver is an SQL client and a database administration tool - Free Alternative to SQL Server Management Studio | ESX Virtualization
White-Label Backup Solution as a part of MSP Offering
Amazon S3 Storage Classes Explained
Managed Service Provider Pricing: Basic Guide on MSP Pricing Models
Best Backup Software in 2018 | G2 Crowd
What is SAP S/4HANA? – Business Introduction
SAP S/4HANA
The Many Hats Club: Color Doesn't Matter
20 Critical Security Controls: Control 11 - Secure Configuration for Network Devices
Physician, protect thyself: An ounce of prevention is worth a pound of cure - Security Boulevard
Nine Selves and the Hero’s Journey – Michael O. Church
How to improve your code using SonarQube
DSHR's Blog: Flash vs. Disk (Again)
Tofugu — A Japanese Culture & Language Blog
How Long Does It Take To Recover From vSAN Drive or Node Failures? — ThinkCharles.net
Metrics, Measurement, and Information Security -
SamSam Ransomware: How to Identify and Mitigate the Risk - Blog | Tenable™
How to prepare for a security audit | Trail of Bits Blog
GRUB Recovery for UEFI/GPT/LUKS/LVM · The Hacking Memento
GoScanSSH Malware spread avoiding Government and Military networksSecurity Affairs
IPFS is the Distributed Web
Securing the Corporate WLAN in a Healthcare Regulated Organization - securing-corporate-wlan-healthcare-regulated-organization-38370
Top 6 steps for GDPR compliance
InfoSec Handlers Diary Blog - How are Your Vulnerabilities?
NBlog - the NoticeBored blog: NBlog April 4 - 7 top tips on documentation
Announcing: new British Standard for cyber risk and resilience – Microsoft Secure
MalwareJake: Atlanta government was compromised in April 2017 - well before last week's ransomware attack
7 common flaws that keep security managers up at night
7 points CEOs need to know about Spectre and Meltdown
Envizon - Network Visualization Tool With Focus On Red / Blue Team Requirements - KitPloit - PenTest Tools for your Security Arsenal ☣
Pyfiscan - Web-Application Vulnerability And Version Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Moloch - An Open Source, Large Scale, Full Packet Capturing, Indexing, And Database System - KitPloit - PenTest Tools for your Security Arsenal ☣
GRR Rapid Response - Remote Live Forensics For Incident Response - KitPloit - PenTest Tools for your Security Arsenal ☣
Security Onion - Linux Distro For IDS, NSM, And Log Management - KitPloit - PenTest Tools for your Security Arsenal ☣
The GDPR: A guide for small businesses – IT Governance Blog
15% of computers still run on Windows XP at NHS Lothian in Scotland – IT Governance Blog
Employees’ lack of security awareness is “inexplicable and inexcusable” – IT Governance Blog
Simplify your risk assessments – IT Governance Blog
How to write an ISO 22301-compliant business continuity plan – with example template – IT Governance Blog
Data Security and Protection (DSP) Toolkit launched for health and social care – IT Governance Blog
GDPR compliance for professional services firms: time to get on track – IT Governance Blog
7 principles of the PRINCE2 project management method – IT Governance Blog
ISO 27001: How to set and document your information security objectives – IT Governance Blog
Why you should know about SSL certificates: CertDB.com Case
10 Alarming Cyber Security Facts that Threaten Your Data [Updated]
10+ Critical Corporate Cyber Security Risks – A Data Driven List [Update 2018]
Why Is Shadow IT So Common in Healthcare? - HealthcareInfoSecurity
Should HHS Offer Incentives for Cybersecurity Frameworks?
Full Disk Encryption on Linux – Exotic Security
Using Piwik Analytics – Exotic Security
What exactly is encrypted with Android full disk encryption?
Setting up FreeRADIUS to secure your WiFi – Exotic Security
KeePassX
Is patching still the best defence – Exotic Security
Automatic Updates for Debian – Exotic Security
Setting up Gogs on Debian Jessie with Apache2 and PostgreSQL – Exotic Security
Ansible Role Rdiff-Backup Script | World Backup Day | b3n.org
Fill Your Skills Tank - The IT Hollow
How to Reset the ESXi Root Password
Docker for impatient newbies part 1: Getting started – The Buttonfactory
20 Ways to Get The Most Out of Your Data Platform - Thomas LaRock
IP Over InfiniBand and KVM Virtual Machines - Patshead.com Blog
Lecture Your Sudoers - krypted.com
Out-Default Considered Harmful! | Keith's Consulting Blog
How to setup PFSense with the new Secure and Private CloudFlare 1.1.1.1 DNS – jasoncoltrin.com
Errata Security: WannaCry after one year
How to Set Up AWS CloudTrail: An Important Step in Account Security - Delta Risk
Slideshows - Dark Reading
3 Security Measures That Can Actually Be Measured
Medical Device Security Startup Launches
Four Gas Pipeline Firms Hit in Attack on Their EDI ...
How Security Can Bridge the Chasm with Development
How to Build a Cybersecurity Incident Response Plan
Supply Chain Attacks Could Pose Biggest Threat to ...
The Definition of Security is “Without Worry"
DevOps as the Art and Science of Deliberate Practice
Analysis of the 2018 F5 Threat Intel Report
11 ways ransomware is evolving | CSO Online
What is FedRAMP? How cloud providers can work with the U.S. government | CSO Online
MITRE ATT&CK
RSA Conference: CISOs' top 4 cybersecurity priorities | CSO Online
What is a supply chain attack? Why you should be wary of third-party providers | CSO Online
Integrating Ansible with Jenkins in a CI/CD process
SQL Server Always Encrypted Data | CQURE Academy
GDPR: end user data loss prevention | CSO Online
An excellent demonstration of Cross-Site Request Forgery – Exotic Security
Alternative Networks for this site - ZeroNet – Exotic Security
Alternative Networks for this site - Tor – Exotic Security
Alternative Networks for this site - I2P – Exotic Security
Kerckhoffs's principle – Exotic Security
Setting up mailpile on Debian 8 Jessie for remote access – Exotic Security
Adding subject alternative name to certificate request – Exotic Security
Riot – Riot – open team collaboration
Home | Matrix.org
Seting up Matrix Synapse and Riot on Debian 8 Jessie – Exotic Security
Using ssh config to save settings and make your life easier – Exotic Security
Chris's Wiki :: blog/sysadmin/BackupCompressionNumbers
Storing passwords in cleartext: don't ever
Newsboat - An RSS/Atom Feed Reader for Linux Terminals
12 Git tips for Git's 12th birthday | Opensource.com
ASD's Essential Eight – Exotic Security
How I Manage Successful Customer 360 Projects
Upgrading a Nexus 6P from CyanogenMod 13 to LineageOS 14 – Exotic Security
Automating Oracle Linux Installation with Kickstart - Blog dbi services
Working with Windows File and Folder NTFS Permissions (Copy and Reset) – A Windows System Admin's Blog
Best Free Web Application Firewalls - Add an External Security Layer - LinuxLinks
IP Addresses in Entertainment | The Networking Nerd
Akash Network
Overclock Labs | Distributed Infrastructure, Simplified
10 Killer Tips To Speed Up Ubuntu Linux
How to Install Ansible AWX on CentOS 7
Is Cybersecurity Improving? - Lawfare
Is It Legal to Publish Email Correspondence Without Permission? - Law and Daily Life
Foolish money mistakes (and how to avoid them) ~ Get Rich Slowly
2 Simple Principles to Make Your Business Relationships More Profitable
GitHub - gerbera/gerbera: UPnP Media Server for 2018 (Based on MediaTomb)
FDA wants Facebook and Twitter to crack down on opioid sales
6 myths CEOs believe about security | CSO Online
SamSam group deletes Atlanta's contact portal after the address goes public | CSO Online
How to configure multiple websites with Apache web server | Opensource.com
Jaffar's (Mr RAC) Oracle blog: Backup2Cloud - a backup/restore automation utility
How reimaging detects the ODA hardware? - Blog dbi services
12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
Install SquidGuard with Squid proxy server : Complete guide - LinuxTechLab
How to Benchmark Your System (CPU, File IO, MySQL) with Sysbench
FOSS Project Spotlight: CloudMapper, an AWS Visualization Tool | Linux Journal
Apple now lets you access medical records in Health app
A simple (but effective) investment strategy ~ Get Rich Slowly
Dinnertime: Which Meals Offers The Most Nutrition Per Dollar? — My Money Blog
Epic Fail: Microsoft's Windows 7 Meltdown Fix Made Your PC More Insecure
How to programmatically set-up a (HTTP) proxy for a Selenium test | Adventures in the programming jungle
The hidden (and not so hidden) costs of a ransomware attack | CSO Online
Setting Up Full Disk Encryption on Debian 9 Stretch – Exotic Security
Installing OpenCanary on a Raspberry Pi – Exotic Security
Upgrading vSphere 5.5 before End of General Support – The Wifi-Cable
Benefits of Cloud Storage: Cloud Backup Cost, Data Availability and More
​Happy 25th birthday Red Hat Linux! | ZDNet
9 Ways to Vet Your New Employer
BranchScope: Your Intel CPUs Are Vulnerable To New Spectre-Like Attack
Manage your workstation with Ansible: Automating configuration | Opensource.com
How to create an open source stack using EFK | Opensource.com
Elasticsearch, Fluentd, and Kibana (EFK)
Get money: Live the life you want, not just the life you can afford
Attending AWSome Day #AWSomeDay #AWS @AWS_UKI @AWScloud – vMusketeers
Teaching ‘Cybersecurity Law and Policy’ - Lawfare
IETF Approves TLS 1.3 as Internet Standard
Dunning-Kruger in IT Infrastructure « ipSpace.net by @ioshints
5 Minute FOSS: Spinning a custom Linux distribution | Linux Journal
Reuse before buy before build – Exotic Security
OWASP OWTF
"WannaCry" ransomware attack losses could reach $4 billion - CBS News
Setting up Backblaze for Duplicati – Exotic Security
Hang Gliding Over Hell, 3 drives die in a 6 drive NAS – Exotic Security
Jaffar's (Mr RAC) Oracle blog: Oracle Cloud - Database Services
Jaffar's (Mr RAC) Oracle blog: Tricky Oracle data guard situation
Jaffar's (Mr RAC) Oracle blog: Benefits from Oracle Backup to could service
IT Value: Using the Web to Divide Your Organizations for Effective Resource Management | CIO
A Breakdown of Utility Computing | CIO
Ransomware Damage Costs $5 Billion in 2017, Up from $350 Million in 2015Cybersecurity Ventures
General Data Protection Regulation
GitHub - redhat-performance/quads: Automated future scheduling, documentation, end-to-end provisioning and assignment of servers and networks.
BSI Kitemark | BSI Group
FY17 NDAA Bill Summary.pdf
Cybersecurity experts: Device makers have “duty to keep users safe” from hacking | Imperial News | Imperial College London
BeyondCorp A New Approach to Enterprise Security
Hippocratic Oath for Connected Medical Devices | i am the cavalry
Draft NISTIR 8200, Interagency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT) - nistir8200-draft.pdf
Tech Networking in Asheville NC and Western North Carolina
GitHub - R0GGER/docker-wsusoffline: Using a Docker container for WSUS Offline Update...
Leader in Third-Party Remote Access | Third-Party Remote Support | SecureLink
BeyondCorp | Run Zero Trust Security Like Google
Database Authentication with a Smart Card – Part 1 | Late Night Oracle Blog
FOSSA - Effortlessly comply with open source licenses
Linux mkfifo Command Tutorial for Beginners (with Examples)
ddgr - A Command Line Tool To Search DuckDuckGo From The Terminal | 2daygeek.com
ddgr
Digitizing VHS with Fedora | Opensource.com
8 Ways to Maintain a Clean, Lean Ubuntu Machine - Make Tech Easier
Huawei – Probably Not What You Expected | penguinpunk.net
Atlanta officials still 'working around the clock' to resolve ransomware attack | CSO Online
Shenzhen's Homegrown Cyborg - Motherboard
GitHub - cldrn/rainmap-lite: Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!
Windows Server release information | Microsoft Docs
Windows Client and Server in 2018 – Stick To The Script
Every Business Needs to Prioritize Security - common denial
Defining Computer Security Incident Response Teams | US-CERT
CERTs, CSIRTs and SOCs after 10 years from definitions - Security Boulevard
4 Tips for Managing an Employee with Addiction
My life philosophy: 49 things I've learned during 49 years on Earth
Teamwork: Embracing new culture of work – The Art of Possible
Going paperless with Tesseract OCR
Hackaday Visits World’s Oldest Computer Festival: TCF 43 | Hackaday
How to download files with Powershell - Thomas Maurer
TCF
Tracking ransomware end-to-end | the morning paper
How to Save on Storage cost and security using AWS - ITSMDaily.com
Infosecurity.US - Web Log - Our Strategy...
Technological Unemployment: Yes, It’s Our Problem Too – Michael O. Church
8 Easy Ways to set your Desktop up for a Distraction-Free Software Demo
Virtual data protection officer service helps UK businesses with GDPR compliance [Q&A]
Tackling a Fear Of Public Speaking
Automating DataDog with Terraform
Windows Metric Dashboards with InfluxDB and Grafana
5 Tips for Writing DSC Resources in PowerShell 5
Ultimate PowerShell Prompt Customization and Git Setup Guide
Testing Ansible Roles Against Windows with Test-Kitchen
Slow Transfer, Packet Losses, Congestion Avoidance, Shaping and Policing (by Phil Storey)
City of Atlanta paralyzed by a ransomware attack, is it SAMSAM?Security Affairs
What Does the GDPR Consider to be a Data Breach?
Computer Forensics: Chain of Custody
SANNY Malware Delivery Method Updated in Recently Observed Attacks - Security Boulevard
Beware the fake Facebook sirens that flirt you into sextortion – Naked Security
ODIN - Tool For Automating Penetration Testing Tasks - KitPloit - PenTest Tools for your Security Arsenal ☣
PyRexecd - Standalone SSH Server For Windows - KitPloit - PenTest Tools for your Security Arsenal ☣
Cyber attacks: What to prepare for – IT Governance Blog
How ITIL can help your cyber security career – IT Governance Blog
How ISO 27001 and ISO 22301 can help keep your organisation secure – IT Governance Blog
vSAN Benchmarking on Consumer Grade Kit — ThinkCharles.net
Removing Inaccessible Objects in vSAN — ThinkCharles.net
A Look At The Relative Spectre/Meltdown Mitigation Costs On Windows vs. Linux - Phoronix
Setting up a safe development environment in Linux · gsilvapt dot me
Healthcare Exchange Standards: Privacy is not dead, but does need reinforcement
4 Ways Every Employee Can Play a Role in Their Company’s Security
Hybrid cloud security: Emerging lessons | The Enterprisers Project
Create VLAN bridge under Linux (trunk, IEEE 802.1Q) | panticz.de
A system administrator's guide to getting started with Ansible - FAST!
Is Patching And Tech Support Bad? A Response | The Networking Nerd
vMotion with 40GbE NIC – virtual graveyard
The Linux Journal NSA Weekend Reading List: Tails and Tor | Linux Journal
Doc Searls Weblog · Facebook’s Cambridge Analytica problems are nothing compared to what’s coming for all of online publishing
France's Cyberdefense Strategic Review and International Law - Lawfare
United States Cyber Command’s New Vision: What It Entails and Why It Matters - Lawfare
Dell EMC and VMware – Better Together for Service Providers - VMware Telco NFV Blog - VMware Blogs
mastodon.social - Mastodon
VMware ESXi and ESXTOP "P" Key is New in vSphere 6.5 - Did you know? | ESX Virtualization
Surviving 63 Drives Failure on vSAN — ThinkCharles.net
NSX-v 6.3 - Load Balancing capabilities + confi... |VMware Communities
25 Low-Cost Foods Packed With Nutrition
Advice for a young adult learning to manage money ~ Get Rich Slowly
New R2D2 Technique Protects Files Against Wiper Malware
An accessible overview of Meltdown and Spectre, Part 2 - Security Boulevard
Cloud Backup for Small Business: 3 Misconceptions SMBs Have About Cloud
Study: Malware counts higher on computers whose users visited piracy sites
Government ‘should have done more’ to prepare organisations for the GDPR – IT Governance Blog
80% of organisations affected by cyber security skills gap – IT Governance Blog
On purpose and by necessity: compliance under the GDPR | the morning paper
Three years of the Right To Be Forgotten | the morning paper
10 Vital Features You Should Know About Your Windows PC
10 Basic Encryption Terms Everyone Should Know and Understand
Lack of investment in security training adds to skills gap
Google Beefs Up Cloud Security and Data Privacy Tools | News & Opinion | PCMag.com
White House pushing for research carveout in GDPR
Why is the CISO Role the Most Difficult Job in the World?Webinar.
Digital Advertising Consent
Oath Takes Aggressive Steps Outlining GDPR Compliance 03/22/2018
Is MLAG an Alternative to Stackable Switches? « ipSpace.net by @ioshints
Suplemon - A Powerful Console Text Editor with Multi Cursor Support
Practical Security Principles
The Reason Software Remains Insecure
The Two Kinds of Privacy Loss
Mitigating Personal Cyber Risk | CSO Online
How Programming Affects Your Brain: 3 Big Truths According to Science
How to Decide If You Need the New Raspberry Pi 3 B+ Model
Wireshark, an Open-Source Forensic Tool
Opening RDP sessions from KeePass
CRISC Domain 2: IT Risk Assessment
Why it’s a bad idea to break the rules, even if it’s for a good cause - 80,000 Hours
Use Ansible to patch your system and install applications | Opensource.com
A Guide to Preventing Common Security Misconfigurations
CASP Domain 4: Integration of Computing, Communications, and Business Disciplines
8 Podcasts About Crypto for Future Bitcoin Millionaires
Threat Horizon 2020: Foundations Start To Shake - Information Security Forum
10 efficient tools every marketing team needs in 2018
ToolsWatch.org – The Hackers Arsenal Tools Portal » T.rex_scan v0.2 – Integrate Tools to Audit Web Sites
Critical Security Controls v7 RELEASED - Security Boulevard
Yoda - The Command line Personal Assistant For Your Linux System - OSTechNix
WPSeku v0.4 - Wordpress Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Cybersecurity Spring Cleaning: 3 Must-Dos for 2018 ...
Zerto – What it is and why you need it | JonKensy.com
Case Study: Scaling Your Data Scientist
Your servers are replicated? Your backups should be, too » NetWorker Information Hub
SOC in Translation: 4 Common Phrases & Why They ...
Western Digital – The A Is For Active, The S Is For Scale | penguinpunk.net
7 Types of People Who Will Help Grow Your Career
Evil Tester: Automated Execution for Acceptance Testing - Java JUnit FizzBuzz
AMD vows to fix newly-disclosed processor vulnerabilities
Moro - A Command Line Productivity Tool For Tracking Work Hours - OSTechNix
7 Spectre/Meltdown Symptoms That Might Be Under ...
Codev2:Lawrence Lessig
(My) OWASP Belgium Chapter meeting notes | Adventures in the programming jungle
redhat event Ansible Automates Zurich - Blog dbi services
The Cambridge Analytica-Facebook Debacle: A Legal Primer - Lawfare
NBlog - the NoticeBored blog: NBlog March 20 - a critique of CIS netsec metrics
Python BeautifulSoup Tutorial For Beginners | Linux Hint
Taipan - Web Application Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Lessons the world took from ITIL | The IT Skeptic
ISO 27001 and the GDPR
Do IT Pros Consider Security When Purchasing Software? - Security Boulevard
CIS Releases Revised Top 20 Critical Security Controls
CUDA is Like Owning a Supercomputer | Hackaday
A Data Protection Officer's Guide to the GDPR Galaxy
Insider threat examples: 7 insiders who breached security | CSO Online
How to Encrypt Files From Within a File Manager | Linux.com | The source for Linux information
ACUS_Intel_MedicalDevices.pdf
CSR - ScottErvenMedicalDeviceSecurity.pdf
Underwriters Labs refuses to share new IoT cybersecurity standard | Ars Technica
Talks | i am the cavalry
It's Insanely Easy to Hack Hospital Equipment | WIRED
SNMP Lab Setup and Penetration Testing
Errata: Steve Gibson
Enterprise NAS Data Migration and Replication Solutions | Datadobi
Vint Cerf and Bob Kahn, co-inventors of TCP/IP protocol | FierceTelecom
GitHub - vincentcox/StaCoAn: StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
Network issues with Updates KB4088875 / KB4088878 | Born's Tech and Windows World
Security-announce Info Page
OIG: HHS Improves Security, Yet Flaws Remain - HealthcareInfoSecurity
Weekly Cyber Risk Roundup: Russia Sanctions, Mossack Fonseca Shutdown, Equifax Insider Trading - Security Boulevard
Chris's Wiki :: blog/solaris/ZFSPoolRecoveryComing
Oracle Ravello Blogger Day 2018 (aka #RBD2) | Michelle Laverick...
Seth's Blog: When well-meaning people can't see it the same way
Magical Thinking in Internet Security
A Tale of Two Phases and Tech Inertia | Hackaday
What?s It Take To Be Tomorrow?s CISO? - Security Boulevard
Top 10 articles every SAP BASIS admin must read
Steps to Become CISSP (Certified Information Systems Security Professional)
Cybersecurity Evolution and its Importance in the Digital Age - Security Boulevard
More Free/Open Source Computer Forensics Tools
Are You Compliant with NIST 800-171? - Security Boulevard
9 Cyber Security Tips SMBs Can Implement Now - Delta Risk
CASP Domain 3: Research and Analysis
CASP Domain 2: Risk Management and Incident Response
CASP Domain 1: Enterprise Security
Harden your JBoss EAP 7.1 Deployments with the Java Security Manager - Red Hat Customer Portal
Microsoft Security Intelligence Report volume 23 is now available – Microsoft Secure
Security: 17 Things | Linux Journal
3 best practices for securing Kubernetes environments | Opensource.com
Getting to know your company’s risk appetite | CSO Online
The CLOUD Act Doesn’t Help Privacy and Human Rights: It Hurts Them - Lawfare
GitHub - initstring/linkedin2username: OSINT Tool: Generate username lists for companies on LinkedIn
GitHub - rezasp/joomscan: OWASP Joomla Vulnerability Scanner Project
SpiderFoot
5 reasons why law firms should adopt ISO 27001 – IT Governance Blog
Failing to patch vulnerabilities now will lead to punishment under the GDPR – IT Governance Blog
Get involved in Shaping the Future of the Internet (by Nalini Elkins)
GDPR Violations Are Hiding In Your Database - Here's How To Find Them - Thomas LaRock
We Need To Talk About Dashboards - Thomas LaRock
(ISC)2 Report: Glaring Disparity in Diversity for ...
Oracle Ravello Blogger Day 2 (#RBD2) – Part 2 – Ather Beg’s Useful Thoughts
Oracle Ravello Blogger Day 2 (#RBD2) – Part 1 – Ather Beg’s Useful Thoughts
3 ESXi Backup Methods using the Command-Line
FAI.me - build you own customized installation image
Chris's Wiki :: blog/linux/NfsiotopDesire
How to take back control of /etc/resolv.conf on Linux – Ctrl blog
MSRC security guidance: the dashboard | >_
Oracle Patches Spectre for Red Hat | Linux Journal
Infection Monkey
How to Overclock Your AMD GPU with AMDGPU on Linux - Make Tech Easier
Woke to IT Age Discrimination - The IT Hollow
Terence Luk: Monitoring Microsoft Exchange Server 2010, 2013 and 2016 services with PowerShell script and task scheduler
Emerging Technologies and VeriSM | Purple Griffon
The SQL Server Tiger Team Bookmarks - Thomas LaRock
Intel Spectre/Meltdown Microcode Updates (March 11, 2018) | Born's Tech and Windows World
MSRC security guidance: about release notes | >_
Databases need to be patched to a minimum before April 2019
GRV - A Tool for Viewing Git Repositories in Linux Terminal
Oracle Linux vs RedHat | Linux Hint
Cli.Fyi – A Tool To Quickly Retrieve Useful Information | 2daygeek.com
HIPAA Guidelines & Cloud Service Providers - Security Boulevard
XKCD, Generations - Security Boulevard
An Overview of the CCSP Domains
The Ultimate Guide to CCSP Certification
Evolving to Security Decision Support: Laying the Foundation - Security Boulevard
How to Prepare for the Future of Healthcare Digital Security - Security Boulevard
March Updates on Frameworks & Standards - Security Boulevard
The Top Five SOC 2 Compliance Questions Answered - Security Boulevard
What the Next Era of Cloud Computing Means for AppSec & the SDLC - Security Boulevard
Virginia Commonwealth University Enrolls WhiteHat Security and its Application Security Platform to be the Foundation of its Application Vulnerability Management Program - Security Boulevard
Army History, No. 106, Winter 2018 - AH106(W).pdf
2018 Cyberthreat Defense Report: Where IT Security Is Going - Security Boulevard
From my Gartner Blog - The Virtual Patch Analyst - Security Boulevard
Shifting Gears to Cloud-Centric Cybersecurity - Security Boulevard
What is a vulnerability management program? - The Silicon Underground
VMRay Analyzer: Rapid Malware Analysis for Incident Response (IR) Teams - vmray-analyzer-rapid-malware-analysis-incident-response-ir-teams-38325
Learn More about the 2018 PMP Exam Change | Tech Roots
Measure Security Performance, Not Policy Compliance - Security Boulevard
Who Cares About Cybersecurity? - Lawfare
Comparing Plans | Oracle Scratchpad
How To Quickly Monitor Multiple Hosts In Linux - OSTechNix
HIMSS18: Cybersecurity Takeaways - HealthcareInfoSecurity
GitHub - facebook/zstd: Zstandard - Fast real-time compression algorithm
UTOUG Training Days 2018 in Salt Lake City
NextGen SIEM Isn’t SIEM - Security Boulevard
NBlog - the NoticeBored blog: NBlog March 8 - brainstorming awareness ideas
What’s new for the Command Line in Windows 10 version 1803 – Windows Command Line Tools For Developers
CredsLeaker - Tool to Display A Powershell Credentials Box - KitPloit - PenTest Tools for your Security Arsenal ☣
Ride The Lightning: Large Law Firms Seeing More Data Breaches
Physical Data Center Security – Make it better
sub6 - Web App Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
The cost of a cyber attack – IT Governance Blog
Home Depot in $27.84 million California hazardous waste, privacy settlement
Patching Your Software Alone Is A Hassle. Not Patching Is A Risk
Your IT shop is Ugly! Part 3 | Virtual Me
Your IT shop is Ugly! Part 2 | Virtual Me
Your IT shop is Ugly! Part 1 | Virtual Me
Updated Oracle Roadmap Points To Post-11.4 Solaris Release Around 2020 - Phoronix
vSAN Online Health checks: New KBs now available - Virtual Blocks
vSAN Online Health checks: New KBs now available - Virtual Blocks
Rubrik Automated IT Helpdesk Ticketing v1 – Virtually Sober
Intel X710 NICs Are Crap - The Lone Sysadmin
Essential RHCE/RHCSA Study Guides – Codingbee
Nobody is an expert at Oracle Database 18c | The ORACLE-BASE Blog
Get IAM roles,policies and users-AWS CLI | geekdudes
Make Your Program Slower With Threads - Marc's Blog
Two traps in iostat: %util and svctm - Marc's Blog
Beyond iostat: Storage performance analysis with blktrace - Marc's Blog
Latency lags bandwidth - Marc's Blog
A layered approach to backups | Scott Gruby's Blog
PowerCLI - VM and Host Metrics To Elasticsearch - EverythingShouldBeVirtual
Ansible for Extreme Devices · Lindsay Hill
Network Janitor | The Smartest Guy in the Room
How to Setup iSCSI Server (Target) and Client (Initiator) on Debian 9
Deeper Dive—Are the 3 major DRAM producers gaming the market? | FierceCable
sigma - Generic Signature Format for SIEM Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
How to write a GDPR privacy notice – with documentation template example – IT Governance Blog
Equifax facing historic data breach costs
GDPR - Three Things You Can Do Now to Prepare
Link Layer Discovery Protocol (LLDP): How it Works and Configuration
vRetreat 2018: Zerto Virtual Replication 6.0 – Ather Beg’s Useful Thoughts
Errata Security: Some notes on memcached DDoS
New York attorney general dips his toe into HIPAA’s murky waters
Is Healthcare Sector Cybersecurity Finally Maturing?
Partners HealthCare CISO on Bolstering Endpoint Security
EPIC - SEC Issues Guidance on Cybersecurity Disclosures
Due Diligence on Cybersecurity Becomes Bigger Factor in M&A - WSJ
Responding to GDPR pushback: The business case for compliance
Survey: Health care employees willing to sell confidential data
46 Tips To Save You Time, Money, and Trouble (From The 1950’s!) | Budgets Are Sexy
Addressing Top Health Data Risk Management Mistakes
HIMSS Speaker Dill on Underutilized Security Technologies
Malicious Bash Script with Multiple Features - SANS Internet Storm Center
SMBv1, The Phoenix of Protocols? - /dev/random
6 Questions to Ask Your Cloud Provider Right Now
Essential guidance on achieving and prioritising GDPR compliance – IT Governance Blog
Free green paper: essential compliance guidance for the NIS Directive – IT Governance Blog
Generating Scan Reports Using Nmap (Output Scan)
7 traits of a valuable DevOps team player | The Enterprisers Project
8 Best Tools to Access Remote Linux Desktop
Insider Threat Seriously Undermining Healthcare ...
Pragmatic Security: 20 Signs You Are 'Boiling the ...
Identity Management: Where It Stands, Where It's Going
Hackers Set New DDoS World Record: 1.7 Tbps
3 open source tools for scientific publishing | Opensource.com
Cybersecurity Gets Added to the M&A Lexicon
How to automatically scale Kubernetes with Horizontal Pod Autoscaling - Justin W. Flory's Blog
MAAS for the home | Ubuntu Insights
Healthcare Experiences Twice the Number of Cyber Attacks As Other Industries | CSO Online
SecurityBrief Australia - Exclusive Interview: Red Hat on their software-defined storage solution for surveillance
Host your own email with projectx/os and a Raspberry Pi | Opensource.com
projectx / os · GitLab
Cyberspace is the New Battlespace - Lawfare
BlackBerry's post-phone future includes IoT security
4 Ways Small Businesses Can Improve Their Cyber Security Strategies
How Can You Develop Good Leadership as a Business Owner?
EFF: Geek Squad has been working with the FBI for a decade
SQL database engine service startup failure: Troubleshooting Checklist – Don Castelino
Setting Up HAProxy for a SaaS Application - via @codeship | via @codeship
Barrier-enabled IO stack for Flash storage | the morning paper
How CEOs Without College Degrees Got to the Top
Seth's Blog: Bonnie's rules for being a better client
10 Techniques to help you present better | Power BI
Quantum Computing: Quick Reference Guide – Microsoft Faculty Connection
Two new GDPR solutions – Modern Workplace – Partner Readiness
Automatically Generating SQL Server Memory Dumps at a Defined Interval – SQL Meditation
Recent Changes in my "Learning Tools" Repository - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, virtualization, and networking, all with an open source view
How to use partclone to create a "smart" partition backup - LinuxConfig.org
Five Strategies For Surviving A Software Audit - IT Jungle
Sense/Net - Photoframe
Almost half of US healthcare organizations breached in the past year
1 Terabit DDoS Attacks Become a Reality; Reflecting on Five Years of Reflections
Carlos Morales
Happy birthday to us! - Raspberry Pi
Thermal Camera Diagnoses Thermal Issue on a Sonoff Switch | Hackaday
Fixing Health IT Security Risks at an Academic Hospital & Trauma Center
HIMSS 2018 Preview: Security, Business Intelligence & Interoperability
What is Rancher? Containers in the age of Cattle – Marksei
DeployHappiness | Remotely Renaming Computers Forever – A PowerShell Adventure
DSHR's Blog: Archival Media: Not a Good Business
DSHR's Blog: "Nobody cared about security"
9 Useful Electronics Tools Under $13 | Cool Tools
BPF comes to firewalls [LWN.net]
Cilium
Upgrading Your Blade Servers For Free – Blades Made Simple
International Law and Cyberspace: Evolving Views - Lawfare
18c new Lost Write Protection - Blog dbi services
Practical Lessons on WPF Forms and PowerShell | Alan's Blog
Preventing DDoS amplification attacks based on memcached - Red Hat Customer Portal
ToolsWatch.org – The Hackers Arsenal Tools Portal » Prowler v1.6 – AWS Security Assessment and Forensics Tool
The World's Largest Repository of historical DNS data.
Policy routing for 'GUEST LAN' » Saved LOG
Is there a CAP theorem for Durability? - Marc's Blog
r
Hyper-V Virtual Machine Backup Utility (Update Version 4.1) – Stick To The Script!
Value In Automating Processes In ITIL® Framework | Purple Gr...
84% of cybersecurity pros are open to switching companies in 2018 - TechRepublic
How to improve Apache server security by limiting the information it reveals - TechRepublic
How it Works: Understanding vSAN Architecture Components
Financial Cyber Threat Sharing Group Phished — Krebs on Security
Healthcare sector's biggest threats come from insiders, report
WannaCry hits 12 Connecticut state agencies
OpenSSH Two Factor Authentication (But Not Service Accounts) · System Overlord
Cl0neMast3r - Git All Your Favorite Tools In One Click - KitPloit - PenTest Tools for your Security Arsenal ☣
Two Ways to Get Mapped Drives with WMI | Alan's Blog
1.35Tbps: GitHub Faced World's Biggest Ever DDoS Attack
Complying with NIST Guidelines for Stolen Passwords - Security Boulevard
Bruce Plante's 'Russian Cyberwarfare' - Security Boulevard
Securing Healthcare Data and Applications - Security Boulevard
RIP CERT.org – You Will Be Missed
Hundreds of Tim Hortons outlets across Canada closed after malware attackSecurity Affairs
WAScan - Web Application Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
LineageOS 15.1 (Android 8.1.0) for Raspberry Pi 3
Restic - A Fast, Secure And Efficient Backup Application - OSTechNix
Misleading Cyber Foes with Deception Technology - ...
2018 Privacy Tech Vendor Report
Passhunt - Tool For Searching Of Default Credentials For Network Devices, Web Applications And More - KitPloit - PenTest Tools for your Security Arsenal ☣
Bettercap v2.0 - The State Of The Art Network Attack And Monitoring Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
yakLab Part 1c: Bootstrapping Bifrost with Ansible · Leif Madsen
yakLab Part 1b: Kickstart File Build Out · Leif Madsen
yakLab Part 1a: Building the virtual Cobbler deployment · Leif Madsen
yakLab build out · Leif Madsen
Create a virtual undercloud with TripleO Quickstart · Leif Madsen
A Secure Development Approach Pays Off
Training insurance agents and brokers in cyber risk | CSO Online
Sizing Up the Role of Deception Technology in Healthcare
Using a 'Privacy by Design' Approach to GDPR Compliance
Reminder: Beware of the "Cloud" - SANS Internet Storm Center
How to manage your workstation configuration with Ansible | Opensource.com
Nuance says NotPetya attack led to $92 million in lost revenue | CSO Online
14 top tools to assess, implement, and maintain GDPR compliance | CSO Online
Creating virtual machines in libvirt with virt-install · Leif Madsen
Peanalyzer - Advanced Portable Executable File Analyzer And Disassembler - KitPloit - PenTest Tools for your Security Arsenal ☣
CALISDO: Threat Modeling for Distributed Designs - Marc's Blog
Understanding Guide to Mimikatz
Presentation: Understanding & avoiding AV detection | DiabloHorn
An introduction to ITIL – IT Governance Blog
GDPR priorities in the lead up to May – IT Governance Blog
List of data breaches and cyber attacks in February 2018 – IT Governance Blog
Consumer group: GDPR will have positive impact worldwide
A Sneak Peek at the New NIST Cybersecurity ...
How & Why the Cybersecurity Landscape Is Changing
What Enterprises Can Learn from Medical Device ...
Ansible, Part IV: Putting It All Together | Linux Journal
An Update on Chinese Cybersecurity and the WTO - Lawfare
Chris's Wiki :: blog/linux/WorkMachine2017
The Third Generation of Security is Here | CSO Online
Best security software, 2018: How 5 cutting-edge tools tackle threats | CSO Online
New Cyber Security Style Guide helps bridge the communication gap | CSO Online
“Medjacked”: Could Hackers Take Control of Pacemakers and Defibrillators—or Their Data? | The Knowledge Group
Memcached DDoS – There’s Still Time to Save Your Mind | The Networking Nerd
Summary: The EU General Data Protection Regulation - Lawfare
Vulnerability in HPE Integrated Lights-out 2, 3, 4 | Born's Tech and Windows World
Chris's Wiki :: blog/linux/CheckingRAMDIMMInfo
Upgrade ESXi 6.0 to 6.5 via command line - JBcomp.com
iSCSI – target and initiators – Codingbee
Chris's Wiki :: blog/sysadmin/AutomatingAcmetool
Chris's Wiki :: blog/tech/MeltdownBadTimeToBuy
Block Advertising on your Network with Pi-hole and Raspberry Pi | hobo.house
Chris's Wiki :: blog/linux/ZFSOnLinuxExperienceII
Stability and evolution together are good signs. They mean that you have a project that is not stagnating and that's well run, and further that people care enough about ZFS on Linux (and use it enough) to bring up important features on it first (in the broad open source world).
GitHub - f1xpl/openauto: AndroidAuto headunit emulator
crankshaft: raspberry pi + android auto + free software + love.
Top 10 open source legal stories that shook 2017 | Opensource.com
DevOps jobs salaries: 9 statistics to see | The Enterprisers Project
AI Beats 20 Top US Lawyers, Reads Contracts In 26 Sec With 94% Accuracy
BAS and Red Teams Will Kill The Pentest - Augusto Barros
E-Mail Leaves an Evidence Trail - Security Boulevard
Computer Forensics: FTK Forensic Toolkit Overview
Secure & Compliant Payment Solutions for Contact Centers | PCI Pal
The Five Attributes Needed to Succeed at DevSecOps - Security Boulevard
The 12+ Internet Crime Stories That Make Cybersecurity Measures Essential
Why it matters?
IoT hack: how to break a smart home…again - Securelist
Cloud Computing Basics - Security Boulevard
Advance Web Application Testing using Burpsuite
Python Graphing Library, Plotly
The EU Network and Information Security (NIS) Directive
Australia’s Mandatory Breach Notification Laws: Time to Predict, Prevent, and Protect - Security Boulevard
18c, Cloud First and Cloud Only features: think differently - Blog dbi services
Lessons From Recent HIPAA Settlements - GovInfoSecurity
Upgrade to the UEK Release 5 Preview on Oracle Cloud Infrastructure | Oracle Linux Blog
The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf
state-of-cybersecurity-report.pdf
Set up boot method using IPMI - Dell Community
TripleO: Using the fake_pxe driver with Ironic · Leif Madsen
Dylan @ His Best: IPMI Upgrade through PXE
PXE BOOT « LINUX TUTORIAL
icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network - KitPloit - PenTest Tools for your Security Arsenal ☣
The Dirty Dozen Vendors Deluging Your Vulnerability Management Team - Security Boulevard
Google Cloud Platform
Ikigai – Finding Your “Reason For Being” — My Money Blog
Ipmitool - Kyle's Wiki
Cyclelicious » vSphere 5 Network PXE install
Chris's Wiki :: blog/tech/MisleadingAverages
How to use IPMI and IPMITOOLS » Saved LOG
Chris's Wiki :: blog/sysadmin/FileserversVsTheCloud
Dell C6100 BIOS/BMC Configuration | vNetWise
pxe - How do you add a machine to MAAS with IPMI power using CLI - Ask Ubuntu
IBM Knowledge Center - I/O tracing using blktrace
Chris's Wiki :: blog/linux/BlktraceNotes
Why culture is the most important issue in a DevOps transformation | Opensource.com
Virtual Institute for I/O [Virtual Institute for I/O]
Beyond iostat: Storage performance analysis with blktrace - Marc's Blog
ODA Re-Image Baremetal (12.1.2.12) | EzDBA – BLOG
Quickly Make Fedora Linux Fonts Glorious | hobo.house
A slightly more realistic look at lvmcache – The ongoing struggle
blktrace
bcache and lvmcache – The ongoing struggle
Tracking down the lvmcache fix – The ongoing struggle
Online RegExp Testers | ma.ttwagner.com
Half a Petabyte in 4U | ma.ttwagner.com
Counting open files by process | ma.ttwagner.com
5 indispensable bash tricks | ma.ttwagner.com
Stout-basted Toulouse Sausages and Vegetables | hobo.house
Automate Dell iDRAC Administration with XML | hobo.house
Secure Cloud Data Backups using Python, Tar and GPG | hobo.house
Create OpenStack Users the Easy Way | hobo.house
RDO
Automated OpenStack Deployments with Foreman and Puppet | hobo.house
Simple Disk Performance Testing with Linux | hobo.house
2.5.2. Tuned-adm - Red Hat Customer Portal
Remembering Tom Wallis, The System Administrator That Made The World Better | The Changelog
How to Make Citrus Chicken with Kale | hobo.house
Creating lots of iSCSI LUNs Quickly on Netapp | hobo.house
How to Manually Clean Indexes from Elasticsearch | hobo.house
Back to the Future: Converting a Server VM to Bare Metal | hobo.house
Trick out your Terminal | hobo.house
How to Make Killer Lasagna for Eight | hobo.house
Browbeat Is now an OpenStack Project | hobo.house
Fun and Profit with Reverse SSH Tunnels and AutoSSH | hobo.house
Tmux for GNU Screen Refugees and Vim Users | hobo.house
Automate Infrastructure Docs with Python, WordPress and Foreman | hobo.house
OpenCPN Official Site
7 Underused IPMItool Commands - Postmodern Sysadmin
Installing Debian by PXE using Supermicro IPMI Serial over LAN – The ongoing struggle
Bob Metcalfe — The Man (and Lessons) Behind Ethernet, Metcalfe’s Law, and More | The Blog of Author Tim Ferriss
Automate SuperMicro Server Provisioning or Die Trying | hobo.house
IPMI trick: Set the boot device | ma.ttwagner.com
Learning with Texts :: Help/Information
10 Basic Cybersecurity Measures - 10_Basic_Cybersecurity_Measures-WaterISAC_June2015_S508C.pdf
Australian Cyber Security Centre (ACSC)
Top 4 Mitigation Strategies to Protect Your ICT System: ASD Australian Signals Directorate
Therac-25 - Wikipedia
OpenSnitch
Iridium Browser: A Browser for the Privacy Conscious
infosecinnovations
Incident Response Plan - You Need One... - NetWatcher - Cyber Security and Network Monitoring
Q and A - Script Powershell FileSystemWatcher
GitHub - glasnt/wail2ban: fail2ban, for windows.
An Introduction to Cybersecurity - file.html
Xylok Scanner Xylok Dashboard
Linked - How Manafort’s inability to convert a PDF file to Word helped prosecutors
Pledge: OpenBSD’s defensive approach to OS Security
Another Windows 10 version overview – Red Pill BLOGS
AWS EFS Windows
2017 Was A Nightmare Year For Security
7,900 Vulnerabilities In 2017 You Aren’t Aware Of May Put Your Organization At Risk
The Slow Burn of Meltdown and Spectre: Exploits, Lawsuits, and Perspective
Electricity Rates and Usage | Electricity Local
FactsCruncher - Facts For Fun: Easy way to install TK on Strawberry PERL ON WINDOWS!!
Docker vs CoreOS Rkt
LeanSentry: IIS Application Monitoring + Diagnostics
Resources
media.ccc.de - Sanitizing PCAPs
Vulnerator
Creating a culture of change
The East West Institute's New Report on Encryption: A Review - Lawfare
IBM's Phil Estes on the Turbulent Waters of Container History
Linux LAN Routing for Beginners: Part 1 | Linux.com | The source for Linux information
SAP Offers Three New GDPR Compliance Tools 02/22/2018
CCNA Training » Basic MPLS Tutorial
Prevent packages from being updated under Ubuntu / Debian – – Unixblogger –
How to Record Your Screen Using VLC
12 bad enterprise security habits to break | The Enterprisers Project
Kaspersky Lab v. DHS: The Government's Response and Kaspersky's Reply - Lawfare
Top 5 Useful VMware ESXi CLI Commands | ESX Virtualization
2ine the OS/2 emulator | Fun with virtualization
Meltdown patch for OpenBSD is available ... let's wait for feedbacksSecurity Affairs
Cybersecurity - Tips to Protect Small Business from Cyber AttacksSecurity Affairs
Intel failed to warn US government about Meltdown and Spectre flaws before going public
vsRisk™
Spectre and Meltdown Attacks - Security Boulevard
SSL with WildFly 8 and Undertow
Configuring SSL in Wildfly 8/9/10 | Real Life Java
Change Insecure Key To My Own Key On Vagrant
New Spectre/Meltdown Variants - Schneier on Security
Embracing the Chaos of Chaos Engineering - via @codeship | via @codeship
The Ultimate Pre-Install ESXi Host Setup Checklist
Strategies to realizing Cost Savings in Azure – Girish's Blog – Are you developing ON the cloud?
Making sense Of Linux namespaces -- Prefetch Technologies
How To Turn An Extra Phone Into A Complete Hotel Room Security System - foXnoMad
Health Net Cited for Refusing a Security Audit
OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies - KitPloit - PenTest Tools for your Security Arsenal ☣
The 5 stages of ITIL – IT Governance Blog
Annabelle ransomware a horror show for users
Announcing dbachecks – Configurable PowerShell Validation For Your SQL Instances | SQL DBA with A Beard
How to Install and Use Netdata Performance Monitoring Tool on Debian 9
What Is Customer Data Onboarding and Do I Need It in My Business?
IOS Tips | Nbctcp's Weblog
How to Choose a Legal Tech Conference to Attend - Law Technology Today
GDPR 72-Hour Notification
Getting Started with IoT Security in Healthcare - ...
How to mitigate rapid cyberattacks such as Petya and WannaCrypt – Microsoft Secure
Key deadlines for the Scottish Public-Sector Action Plan on cyber resilience – IT Governance Blog
Troy Hunt: Introducing 306 Million Freely Downloadable Pwned Passwords
Have I been pwned? Pwned Passwords
What is a SharePoint architect anyway? – SharePoint Steve
Notes - Arnold Workout Advice - NevBlog
US AG creates a new 'Cybersecurity Task Force'
CIOs Say It Could Become Impossible to Manage Digital Performance as IT Complexity Grows | APMdigest - Application Performance Management
LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)
(6) Keynote: A history of the Internet: Hint, it was not the Bomb - YouTube
The AI era: 4 skills IT pros need to develop | The Enterprisers Project
Meltdown, Spectre Likely Just Scratch the Surface ...
7 Awesome Open Source Cloud Storage Software For Your Privacy and Security - nixCraft
L3 routing to the hypervisor with BGP | Vincent Bernat
| Sys Admin Extraordinaire | » Blog Archive » Job Interview Preparation, Tips and Job Transition Tips
WS2016 AD upgrade problem: TLS ciphers | House of Windows Blog
Speeding up TLS: enabling session reuse | Vincent Bernat
12 Open Source Cloud Storage Software to Store and Sync Your Data Quickly and Safely
Death of a middleman: Cloud storage gateways – and their evolution • The Register
Tools for OSForensics - ImageUSB - Write an image to multiple USB Flash Drives
OpenIO | Next-Gen Object Storage and Serverless Computing
Morro Data Announces CloudNAS | StorageReview.com - Storage Reviews
Documentation – OpenDedup
Effective medical device user training: Eight steps
Q&A with Massachusetts AG Maura Healey
ISAS - Our Services - NHS Information Security, Assurance & Penetration Testing
Information Systems Engineering Command (USAISEC)
Crawl coverage and vulnerability detection - Arachni - Web Application Security Scanner Framework
| Sys Admin Extraordinaire | » Blog Archive » Wireless Networking Workaround On VMware ESXi and Hyper-V Hosts Via DD-WRT Client Bridge Mode On A Linksys WRT54G v5
Be Aware of These 5 Data Center Trends in 2018
Digital nomads are hiring and firing their governments | TechCrunch
GitHub - azsdk/azsdk-docs
The Emergence of a Cognitive Risk Era: Cognitive Risk Framework | The GRC Bluebook
A Healthcare Minute: Healthcare Data Security and Systems [Video]
The Father Of The Internet Sees His Invention Reflected Back Through A 'Black Mirror' : All Tech Considered : NPR
What is Debian all about, really? Or: friction, packaging complex applications
DSHR's Blog: Notes from FAST18
This Game Teaches the History of Cryptography - Motherboard
Military Industrial Powerpoint Complex : Free Texts : Download & Streaming : Internet Archive
DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
Top 10 Operational Responses to the GDPR – Part 4: Data protection impact assessments and data protection by default and by design
Vulnerabilities Broke Records Yet Again in 2017
Meltdown/Spectre: The First Large-Scale Example of ...
Benchmarking Amazon EC2 Instances vs. Various Intel/AMD CPUs (February 2018) - Phoronix
One command database upgrade on ODA - Blog dbi services
Chroot: the magical healing powers of the original Linux virtualization tool
Linux command history: Choosing what to remember and how | Network World
Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking - KitPloit - PenTest Tools for your Security Arsenal ☣
Strategy Series: Build vs. Buy (sorta) - The Forwarding Plane | The Forwarding Plane
Deleting an archive from Glacier though the AWS CLI | viktorious.nl – Virtualization & Cloud Management
How to Copy File Permissions and Ownership to Another File in Linux
Efficient Ways To Read The Log Files In Linux | 2daygeek.com
iTWire - Data breach law takes effect on Thursday
Ansible, Part III: Playbooks | Linux Journal
OpenRA - Home
Duplicati Monitoring - dashboard and e-mail reports for Duplicati
Announcing dupReport - A Duplicati Email Report Summary Generator - Duplicati
Windows+Registry+Auditing+Cheat+Sheet+ver+1.1+Jan+2016.pdf
SYS.USER$ table in Oracle – last password change time, last locked, last expired, creation time, failed logon | DBAORA
List of default database users - Oracle FAQ
How to generate an SSH key pair in Linux?
SSH keys - ArchWiki
A surprising way to win in a crashing crypto market
Account Status within a Oracle RDBMS | Catt Solutions
State of Salaries Report - Hired
HODL on for Dear Life: The history and meaning of ‘HODL’ | The Litecoin Community Alliance
Medical Device Security Update: Why the MDS2 Form was Revised | Symantec Connect Community
Acquire Enterprise Mission Assurance Support Service (eMASS)
LKRG: Linux to Get a Loadable Kernel Module for Runtime Integrity Checking
VMSA-2018-0007.1 | United States
Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP - KitPloit - PenTest Tools for your Security Arsenal ☣
Fujifilm Slots Tape into Cloud Backups -- InfoStor
Cloud Storage – ever considered LTFS Tape?? (Storageneers)
Etcher
Learn, Acquire, then Apply… » Blog Archive » How to run SysPrep on an Upgraded Operating System
GitHub - Srinivas11789/PcapXray: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Germany defense minister: Cybersecurity is going to be the main focus of this decadeSecurity Affairs
LMMS Guide Part 1: Creating Simple Melodies Using Sounds And Instruments
Open-Source Object Storage. Comparison of Solutions
X12 EDI file generation | Tallan's Technology Blog
How To Talk With Kids About Terrible Things : NPR Ed : NPR
Brendan Tierney - Oralytics Blog: 18c is now available (but only on the Cloud)
Culture of Quality: Measuring Code Coverage at Etsy - Code as Craft
GDPR and Data Storage Compliance
GDPR and Data Storage Compliance
Selling Remote Backup Service - 6 Helpful Tips
Infrastructure as Code – Microsoft MVP Award Program Blog
Administrator vs. Standard: Which User Account Should You Use in Windows?
Amazon S3 Logging - Enabling and Reading Amazon S3 Logs
Best Online Backup Service: 5 Questions That Need to Be Answered
7 Things You Need to Know about LTFS | SBDS
LTFS Tape-Disk Hybrid Storage: Who Needs Cloud? - EnterpriseStorageForum.com
RDP Cache Forensics – Cyber Forensicator
Three Ways to Take Home the Gold When It Comes to Cybersecurity at the Olympics
ReelPhish - A Real-Time Two-Factor Phishing Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Cyber resilience for the modern enterprise – Microsoft Secure
NBlog - the NoticeBored blog: NBlog February 17 - The I part of CIA
What Does 'Sheep Dip' Mean in Cyber Security? | OPSWAT Blog
Windows Analytics now includes Meltdown and Spectre detectorSecurity Affairs
NOC/SOC Integration: Opportunities for Increased Efficiency in Incident Response within Cyber-Security - noc-soc-integration-opportunities-increased-efficiency-incident-response-cyber-security-38290
A Performance Evaluation of Storage and Retrieval of DICOM Image Content - ora-dicom-bench-2008-129543.pdf
Pymap-Scanner - Python Scanner with GUI - KitPloit - PenTest Tools for your Security Arsenal ☣
Pymap-Scanner
How to avoid duplication when implementing an ISO 27001 ISMS – IT Governance Blog
Align your cyber resilience strategy with government best practice – IT Governance Blog
The key elements of data flow mapping under the EU GDPR – IT Governance Blog
APTSimulator - A toolset to make a system look as if it was the victim of an APT attack - KitPloit - PenTest Tools for your Security Arsenal ☣
Elk + Osquery + Kolide Fleet = Love – JP
How to implement ISO 27001 into your SME quickly and easily – IT Governance Blog
Raspberry Pi: Phoning home using a reverse remote ssh tunnel - TunnelsUP
Remote Monitoring and Management Software | ConnectWise Automate
Leading IT Business Management Software | Autotask
SnowMirror | The Smart Data Replication Tool for ServiceNow
rsync.net Enterprise Cloud Storage
The preparations you need to make ahead of GDPR
Cyber security in (big) numbers
Service Provider Security Solutions - Endpoint Security Solutions for MSSPs - Cisco
Windows 10 compatibility issues forcing US Air Force to scrap a significant number of computers
FreeNAS ZFS snapshot backup to Amazon S3 - Mourtada.se
VCDX181.com - Introducing VMware NSX-T Reference Design
A first look at AWS Greengrass on vSphere - CormacHogan.com
5 Reasons You Need to Start Using Containers Now -- Virtualization Review
GitHub - duplicati/duplicati: Store securely encrypted backups in the cloud!
*Updated* Pricing for Flash/Hybrid, Hyper Converged, SAN/NAS solutions
Top 10 Operational Responses to the GDPR – Part 3: Build and maintain a data governance system
Implementing the CNIL’s GDPR Prep
New Hack Can Steal Data From Devices in Faraday Cages - Motherboard
10 Cyber Security Decisions You (and Me) Will Regret in The Future
Threat Risk Modeling - OWASP
GitHub - deptofdefense/code.mil: An experiment in open source
JVM Monitoring and Performance Assurance for Java-Based Banking and Trading Applications | APMdigest - Application Performance Management
5 Reasons to fall in Love with ITIL | Purple Griffon
CPUs: Cores versus Threads on an Oracle Server - Blog dbi services
EzPi4ME - Getting rid of the Intel ME, for mere mortals – The Pensieve
PowerShell: Creating Domains and Domain Controllers | PeteNetLive
11 awesome vi tips and tricks | Opensource.com
Japan's young shogi star Fujii beats highest title holder Habu - Japan Today
Cyber attacks reportedly cost the US as much as $109 billion in 2016
Container security fundamentals: 5 things to know | The Enterprisers Project
Policy-based routing on Linux to forward packets from a subnet or process through a VPN | stewart a.
SQL Server Management Studio 17.4: Vulnerability Assessment - Blog dbi services
Real-time Linux based automation controller supports up to 16 I/O modules
Add-on board brings BACnet building control to the Raspberry Pi
Check Linux Distribution Name and Version | 2daygeek.com
Meltdown, Spectre and Ubuntu: What you need to know | Ubuntu Insights
Install OpenStack on Ubuntu | Linux Hint
Virtualizing GPU Access
Arch Anywhere is Dead – Long Live Anarchy - OSRadar
NHS Digital release GDPR guidance for health and social care – IT Governance Blog
ZFS vs. OpenZFS
HolisticInfoSec™: toolsmith #131 - The HELK vs APTSimulator - Part 1
General Data Protection Regulation (GDPR) guidance - NHS Digital
How to clone a Dell Optiplex 7050 M.2 NVME Hard Drive with Clonezilla and an External USB HDD – jasoncoltrin.com
Google Dorks List 2018 For Ethical Hacking and Penetration Testing
The Importance of a Growth Mindset in a Technology First World – Nicole Welch
DSC Resource Kit Release February 2018 | PowerShell Team Blog
Active Directory Passwords – Who is Right? – The Personal Blog of Sean Goodwin
The best Linux distro for gaming in 2018 | TechRadar
How to fix loose outlets - The Silicon Underground
Vulnerability management best practices - The Silicon Underground
Email Reminders for PowerShell Tasks
Rules for Radicals - Wikipedia
Seth's Blog: Reversing Alinsky's rules
A Healthcare Minute: Why Interoperability Is Crucial
Running Systems » Blog Archive » Oracle important patches
We need fewer ITSM processes » Optimal Service Management
ITIL processes aren't processes | The IT Skeptic
Get started with KVM & Kubernetes
Introduction to Quantum Computing – Microsoft Faculty Connection
SQL Updates Newsletter – January 2018 – SQL Server Updates and Lessons Learned
Problems With Your Raspberry Pi? Try These 4 Fixes
Spectre and Meltdown attack explained, simply, for non-programmers – The Pensieve
ID-entify - Search for information related to a domain (Emails, Domains, Information on WEB technology, Type of Firewall, NS and MX records) - KitPloit - PenTest Tools for your Security Arsenal ☣
U.S. GAO - Cybersecurity Workforce: Urgent Need for DHS to Take Actions to Identify Its Position and Critical Skill Requirements
DSHR's Blog: DNA's Niche in the Storage Market
FOSDEM - video recordings
Using Terraform taint and Kubernetes cordon To rebuild nodes with no service interruption -- Prefetch Technologies
Creating Kubernetes pods with your favorite OS to test new features -- Prefetch Technologies
Researchers ported the NSA  EternalSynergy, EternalRomance, and EternalChampion to Metasploit - Security AffairsSecurity Affairs
How to configure a Mikrotik router as DHCP-PD Client (Prefix delegation) | Robert Penz Blog
Can You Spot the Social Engineering Techniques in a Phishing Email? | OPSWAT Blog
Zero-K
Equifax breach may have exposed more data than first thought
Grouper - A PowerShell script for helping to find vulnerable settings in AD Group Policy - KitPloit - PenTest Tools for your Security Arsenal ☣
Centralized Firewall Control script
Developing an effective cyber strategy – Microsoft Secure
Overview of Petya, a rapid cyberattack – Microsoft Secure
Six Ways IT Service Providers Can Protect Their Clients from Ransomware
Massachusetts attorney general adds online data breach report portal
BLEAH - A BLE Scanner For "Smart" Devices Hacking - KitPloit - PenTest Tools for your Security Arsenal ☣
Every NHS Trust assessed for cyber resilience has failed on-site assessment – IT Governance Blog
What documentation do I need to achieve cyber resilience? – IT Governance Blog
5 ways ITIL can benefit your organisation – IT Governance Blog
How to write a GDPR data protection policy – IT Governance Blog
Think GDPR Won’t Affect Your U.S. Company? Guess Again
The GDPR: Your best friend (but you know that)
50+ Useful Cyber Security Online Courses You Should Explore [Updated]
Hospital Hit With Cryptocurrency Mining Malware
Partners HealthCare Breach: Why So Long to Confirm?
Apple, Cisco Strike Partnerships for Cyber Insurance
Beginner Guide to IPtables
Payload Processing Rule in Burp suite (Part 2)
Engagement Tools Tutorial in Burp suite
Tennessee Hospital Hit With Cryptocurrency Mining ...
Ticking Time Bombs in Your Data Center
Windows Server - Service not starting with 'Error 1067: The process terminated unexpectedly' - Blog dbi services
Dark Side Ops I & 2 Review Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
Ansible - Generating Inventory From DNSMasq Leases - EverythingShouldBeVirtual
UQDS: A software-development process that puts quality first | Opensource.com
Hey DBA, fix it, but don't touch it! | The ORACLE-BASE Blog
New open source platform offers secure, self-hosted collaboration
Hard Olympic Security Choices: What to Watch for in Pyeongchang - Lawfare
Add a New AWS Account to an Existing Organization from the CLI - The IT Hollow
The Cuckoo’s Egg Decompiled Online Course – Chris Sanders
Turn Any CLI into a Function with OpenFaaS
AG Healey Launches Online Portal for Data Breach Reports | Massachusetts News | US News
Stacer - Linux System Optimizer and Monitoring - KitPloit - PenTest Tools for your Security Arsenal ☣
First look at the new DSP Toolkit shows additional requirements for healthcare organisations – IT Governance Blog
Mastering Security in the Zettabyte Era
Managing ‘Shadow IT’ Risks in Healthcare Settings
Prevent Files And Folders From Accidental Deletion Or Modification In Linux - OSTechNix
Jon Masters On Understanding Spectre & Meltdown CPU Vulnerabilities - Phoronix
GDPR – Six key stages of the data protection impact assessment (DPIA) – IT Governance Blog
Rise in cyber attacks leads to cyber insurance business soaring – IT Governance Blog
Tutorial: Use personal gmail with @yourdomain.com
Meltdown/Spectre Status for Red Hat and Oracle | Linux Journal
CapAnalysis | PCAP from another point of view
Importing OVA container into Proxmox (Step-by-Step) ~ Binary Heartbeat
Azure Governance - Eric’s Azure Blog
Unattended installation of VM images with Packer
Healthcare Reference Checking Software
Microsoft Word - GDPR Checklist for Third Party Agreements _Final_.docx - GDPR-Checklist-for-Third-Party-Agreements__Final_.pdf
Using s3cmd and other Amazon S3-compatible apps with Azure Blob Storage | Microsoft + Open Source
Logjam: PFS Deployment Guide
Steps to GDPR Compliance: Vendor Management - EMEA Blog
SSL Hardening of Wildlfy 8.2 Undertow – Vijay Konnackal
An Introduction to GDPR: Why Third Party Security Will Be Critical
Important information about Microsoft Meltdown CPU security fixes, antivirus vendors and you
Cleveland Clinic names Ed Marx new chief information officer | Healthcare IT News
dokuhebi (Tom Albrecht) · GitHub
Benefits of cloud computing | IBM Cloud
Download Windows 10 Enterprise (1709, 16299) ISO x64 / x86 Free via Official Links
Who’s behind Amazon in IaaS cloud revenue? Not Microsoft - TechWorld
Scanning firewalls for differences in IPv4 and IPv6 rules | Sebastian Neef - 0day.work
Healthcare IT Systems: Tempting Targets for Ransomware - IEEE Spectrum
What's new in SQL Server 2017 presentation | James Serra's Blog
Data Virtualization vs Data Warehouse | James Serra's Blog
Using a Yubikey for GPG and SSH | Sebastian Neef - 0day.work
Don't format, overwrite before you sell! - Recovering data from 2nd hand HDDs | Sebastian Neef - 0day.work
Writing my first shellcode - iptables -P INPUT ACCEPT | Sebastian Neef - 0day.work
Reference architecture for enterprise reporting in Azure | James Serra's Blog
Is the traditional data warehouse dead? | James Serra's Blog
Azure Backup Calculator: Estimate Your Monthly Backup Costs - Agile IT
Cloudyn: Cloud Management Platform & Cloud Cost Optimization Tool
Healthcare Exchange Standards: Apple should have a HEART
Grey-collar - Wikipedia
FFIEC Cybersecurity Awareness
FY16-UW-GBY---IT-Strategic-Plan-2014-17-DK.pdf
Experimental Amazon S3 API support for Backblaze B2 Cloud Storage Service
Network Diagram: An Important Tool for Effective Time Management
43.7. SELinux Policy Overview
Troubleshooting SELinux Issues on CentOS and Red Hat - Serverlab
SELinux/Tutorials/How is the policy provided and loaded - Gentoo Wiki
PCI DSS and the Network Diagram
Network Diagrams: Drawing Overlay Network Layers — EtherealMind
SELinux/Tutorials/Creating your own policy module file - Gentoo Wiki
The Global Consciousness Project
Postman | API Development Environment
CSA Guidance V2.16 - csaguide.pdf
Three ways to align security programs to enterprise strategy | CSO Online
Alternatives to Bastille Linux: system hardening with Lynis
The 5 Best Free MP3 Tag Editors
Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices - 1801.05583.pdf
An Unofficial Raspberry Pi Blog: How to Setup Remote Desktop from a Windows Machine to your Raspberry Pi - Step by Step Guide
Pricing - Remote device management
Raspberry Pi + Apache - MitchTech | MitchTech
remote device management, even over cellular data connections
Who's in the Zone? A Qualitative Proof-of-Concept for Improving Remote Access Least-Privilege in ICS-SCADA Environments - zone-qualitative-proof-of-concept-improving-remote-access-least-privilege-ics-scada-environments-38205
Cyber Hygiene.pdf
Microsoft Word - CYBER HYGIENE.docx - Cyber-Hygiene.pdf
Cybercrimelaw
Recovering from rm -rf on a datafile | Raheel's Blog
Medical Imaging Devices Are Vulnerable To Cyber-Attacks - Information Security Buzz
BSIMM8 Study Reinforces Benchmarking as a Critical Exercise in Early Stages of Software Security
Five steps to GDPR compliance - Help Net Security
Consensus Assessments Initiative Questionnaire v3.0.1 (9-1-17 Update) - Cloud Security Alliance : Cloud Security Alliance
Cyber Security Lectures by Mateti
Pro Tip: PowerShell DSC Events to Monitor – GoateePFE
PowerShell Desired State Configuration: The Basics - Simple Talk
The 11 most difficult IT hires today | CIO
Provide Cross Region Low-latency Service based on Azure VNET Peering – Wu Shuai's Blog
Examining Average Student Loan Balances by State – Robert Kelchen
Setting up a new vSphere Server – Notes from MWhite
The paradigms of programming | the morning paper
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer | the morning paper
Windows Meltdown and Spectre Patches Impact Rockwell Software Users - The Automation Blog
BBSs and early Internet access in the 1990ies | Fun with virtualization
PowerShell for Programmers: What happened to my operators? – Kory Thacher
Operating System Best Practice Configurations for SQL Server – Don Castelino
Volunteer Senior Management Committees Part 3 of 3 | People Centre
Volunteer Senior Management Committees Part 2 of 3 | People Centre
Volunteer Senior Management Committees Part 1 of 3 | People Centre
Good engineers – I. M. Wright’s “Hard Code”
The Windows 10 Link List – PowerInTheShell
Qwikie Paint Touch Up Kit | Cool Tools
Donvier Manual Ice Cream Maker | Cool Tools
What Are Those Hieroglyphics on Your Laptop Charger? | Hackaday
How I Record My Conference Talks
An accessible overview of Meltdown and Spectre, Part 1 | Trail of Bits Blog
How cybersecurity pros can improve their LinkedIn profiles: 4 tips - TechRepublic
Estimating the Cost of Internet Insecurity - Schneier on Security
Does Canada Even Have a Huge Piracy Problem? - Motherboard
6 Potential Security Gaps in File Transfer Process for Critical Infrastructure | OPSWAT Blog
ICMPExfil - Exfiltrate data with ICMP - KitPloit - PenTest Tools for your Security Arsenal ☣
Evilgrade - Modular Framework To Take Advantage Of Poor Upgrade Implementations By Injecting Fake Updates - KitPloit - PenTest Tools for your Security Arsenal ☣
RDPY - Remote Desktop Protocol in Twisted Python - KitPloit - PenTest Tools for your Security Arsenal ☣
PiDense - Monitor Illegal Wireless Network Activities (Fake Access Points) - KitPloit - PenTest Tools for your Security Arsenal ☣
A major cyber attack is a matter of when, not if – IT Governance Blog
5 reasons why business continuity management is essential to your organisation’s cyber security – IT Governance Blog
NIS Directive consultation feedback published – how to comply – IT Governance Blog
List of data breaches and cyber attacks in January 2018 – IT Governance Blog
How to create your PCI DSS charter – IT Governance Blog
IOActive Labs Research: Security Theater and the Watch Effect in Third-party Assessments
FBI official highlights importance of SMB cybersecurity
GDPR will bring 'sea change' to email tracking, website monitoring
Two paths to meeting GDPR training requirements
Top 10 operational responses to the GDPR: Data inventory and mapping
Uber CISO to testify over 2016 data breach
Publishers need a data opt-out ahead of GDPR
RSA web con: Breach notification in the GDPR era
The Five Secrets to Making Security Awareness Work in 2018
Convert Virtual Machine to Raw Images for Forensics (Qemu-Img)
Post Exploitation Using WMIC (System Command)
IoT: Moving to Security by Design - HealthcareInfoSecurity
Digital Forensics Investigation through OS Forensics (Part 3)
Digital Forensics Investigation through OS Forensics (Part 2)
Digital Forensics Investigation using OS Forensics (Part1)
Allscripts Lawsuit: What Makes It Different? - HealthcareInfoSecurity
The Unpatched Mind - How to Get Mental Security in A Digital Landscape
Rationalizing the Security Stack - HealthcareInfoSecurity
$3.5 Million Penalty for Five Small 2012 Breaches
How to Delete Root Mails (Mailbox) File in Linux
It's Time to Make Student Privacy a Priority | Electronic Frontier Foundation
Third-party Security Questionnaires Are Security Theater
GDPR keeping you up? There’s another monster hiding under the bed… | CSO Online
Top 7 open source project management tools for agile teams | Opensource.com
Healthcare cybersecurity spending to exceed $65B over the next 5 years | CSO Online
Healthcare’s Secret Weapon for Securing the IoMT | CSO Online
Is your cloud service provider ready for HIPAA? | CSO Online
4 things CISOs should stress to the board of directors about cloud security | CSO Online
7 Little-Known Facts About IT Pros | APMdigest - Application Performance Management
Cisco CCNP SWITCH Topics – neckercube.com
How to Install Oxidized for Network Configuration Backup – neckercube.com
Open Source turns 20: Here’s how it all started
Retrospection and the Future: Still Studying for the CCIE Lab – neckercube.com
General Network Challenges, and IP/TCP/UDP Operations – neckercube.com
CCIE Flash Card Deck for R&S v5.1 – neckercube.com
Learning the 802.11 Standard - Airheads Community
A history of low-level Linux container runtimes | Opensource.com
My AWS Certified Solutions Architect Professional Exam – Prep Tips and Exam – Ather Beg’s Useful Thoughts
How to Become a Better Networking Engineer « ipSpace.net by @ioshints
How I created PowerShell.cool using Flow, Azure SQL DB, Cognitive Services & PowerBi | SQL DBA with A Beard
Cuckoo’s Egg – Week 8 Notes – Chris Sanders
Cyber Security Threats To Watch Out For In 2018 | Purple Gri...
Router Rebooter Eliminates Hassles | Hackaday
3 ways that the European Union is changing the way Companies write software in 2018
Global Resistor Shortage, Economics, and Consumer Behavior | Hackaday
IBM i PTF Guide, Volume 20, Number 4, The Spectre Of Meltdowns - IT Jungle
Isolating SQL Performance Issues due to slow Disk IO subsystem – Don Castelino
Rapid, Secure Patching: Tools and Methods | Linux Journal
How to Use Continuous Release (CR) Repository in CentOS
SolydXK – A New Distro for Your Collection - OS Radar
Mycroft Mark II: The Open Source Answer to Amazon Echo and Google Home That Doesn’t Spy on You
Building a Business KPI Dashboard
From Solo-Preneur to Manager-Preneur
How to Run Your Service Like a SaaS
Making Progress, Profitably
The Mindset Shifts That Took Me From Freelancer to Productized Business Owner
Turn Distractions Into Opportunities
Self-Limiting Habits of Entrepreneurs
Machine Learning Andrew Ng - Week 4 - Big Data Beard
Productizing by Not Selling Talent
How Surveying Your Audience Changes Everything
How to Land Your First Customers When You're Unknown
Are You Working On The Right Thing?
Content Marketing That Runs Without You
A Bootstrapper's Formula For Hiring Your First Employee
Taming Metrics
A Trust-Based Sales Funnel
What Do The Best Podcasts Get Right?
Balancing Focus, Commitment, and Shiny New Ideas
How to Setup a New Podcast (Step-by-Step Instructions)
The Cascading To-Do List (how to get BIG things done)
The Six Month Plan
Should Designers Learn to be Marketers?
Japanese Culture, Food Exchange With Kentucky Still Going Strong : The Salt : NPR
5 Essential Settlers of Catan Sites and Apps for Tips, Tricks, Strategy, and More
Seth's Blog: "Where did you go to school?"
Taking an Honest Look at Your Data Health | Nuix
Turning Metrics Analysis into Story Telling
The Value Mindset... Which SaaS Apps Do You Pay For?
Make a Plan. Execute. Repeat.
The Importance of Defining Customer Personas (I Finally Get it Now)
When You're Unhappy With a Contractor's Work...
SweetProcess: How We're Validating The Product
Meet My Mistress, SweetProcess!
Extremely Fast MySQL Backup and Restore Using Mydumper/Myloader | DotLayer
Report: Number of cyber incidents doubled in 2017, yet 93 percent could easily have been prevented
ToolsWatch.org – The Hackers Arsenal Tools Portal » Black Hat Arsenal Top 10 Security Tools as Voted by the Audience
Your instant Kubernetes cluster
Synchronize a directory structure with Ansible | Velenux Home Page
IT Service Management and Unified Monitoring: Getting From Here To There | APMdigest - Application Performance Management
Infoga - Email Information Gathering - KitPloit - PenTest Tools for your Security Arsenal ☣
How to Create a Docker Image | Linux.com | The source for Linux information
Psychological Issues in the Security Industry · System Overlord
How to shut down an Azure Stack system. – Azure Field Notes Blog
To the information tecnology and beyond! : Windows Server 2016: Recently added DC do not work, inexistent SYSVOL
Update to Disable Mitigation against Spectre, Variant 2
GDPR coming in 4 months, but only 38% of UK businesses are aware of it - TechRepublic
A Cryptocurrency Theft Bigger Than Mt. Gox Just Happened In Japan - Motherboard
Serious ‘category one’ cyberattack not far off – warns security chief – Naked Security
MalwareJake: Top three considerations when limiting local administrator rights
Securosis - Blog - Article
Intel Building New Silicon to Mitigate Meltdown and Spectre Flaws
Kyoto University, Fujitsu launch research project to advance medicine through use of AI - Japan Today
How to manage cyberbiosecurity risks before a malware attack strikes - TechRepublic
Why cybersecurity should be treated like a disease - TechRepublic
Spectre and Meltdown: Cheat sheet - TechRepublic
Backup Aruba config using Expect | Nbctcp's Weblog
Allscript still recovering from SamSam ransomware attack
Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) - KitPloit - PenTest Tools for your Security Arsenal ☣
Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible - KitPloit - PenTest Tools for your Security Arsenal ☣
Data transfers under the GDPR after Brexit – IT Governance Blog
How an ISMS can ease the strain on CISOs – IT Governance Blog
Can healthcare organisations address their challenges with a single cyber resilience plan? – IT Governance Blog
NHS Wales suffers “widespread failure” of IT systems – IT Governance Blog
Investigating Microsoft BITS Activity - SANS Internet Storm Center
Communication is key when responding to a cybersecurity incident
Blockchain in Healthcare: The Potential and Limitations
Salary Survey 2018: An all-new Salary Survey 75 - CertMag
Facebook to hand privacy controls to users ahead of EU law
Commission releases extensive GDPR guidance
2018 reform of EU data protection rules | European Commission
GDPR is changing DPAs, too
Are the BSDs dying? Some security researchers think so | CSO Online
Financial Impact of Cloud Failure Could Hit $2.8B ...
Expect More Cybersecurity 'Meltdowns' - HealthcareInfoSecurity
Poland's proposed GDPR exemptions spark outrage
2017 Breach Barometer Annual Report / Protenus
​Linux and Intel slowly hack their way to a Spectre patch | ZDNet
How to Encrypt Files with Tomb on Ubuntu 16.04 LTS
Security Chaos Engineering: A new paradigm for cybersecurity | Opensource.com
Fall seven times, stand up eight." —Japanese proverb
Automating DR Testing & Scripting a Rubrik Recovery Plan v2.0 – Virtually Sober
Monitoring Windows Services Sates with Log Analytics – System Center Central – Cloud & Virtualization Complete Guide
Retailers Require New Cloud-Based Technology to Stay Competitive | APMdigest - Application Performance Management
Record ransomware volumes seen in 2017
7 leadership rules for the DevOps age | The Enterprisers Project
Business Language | Don Jones
Gertrude Elion, DNA Hacker | Hackaday
BizTalk Health Monitor 4.2 is publicly available – BizTalkHealthMonitor
Cuckoo’s Egg – Week 7 Notes – Chris Sanders
Best Practices When Versioning a Release - via @codeship | via @codeship
Lack of soft skills holds IT staff back from leadership roles
Troy Hunt: We're Doing an All New Series on Pluralsight: Creating a Security-centric Culture
6 Ways to Take Control of Your Career Development If Your Company Doesn’t Care About It
Organizations blame their own staff for cloud security incidents
Storage Performance Benchmarking with FIO - THE SAN GUY
Build an Excellent Coffee Roaster With a Satisfyingly Low Price Tag | Hackaday
The Perils of Tape » NetWorker Information Hub
Pet - A Simple Command-line Snippet Manager - OSTechNix
Windows 10 Creators Edition New Keyboard Shortcuts – jasoncoltrin.com
Setup Guacamole Remote Desktop Gateway on Ubuntu with one script – jasoncoltrin.com
Linux Digital Forensics Web Resources – jasoncoltrin.com
Security – Blue Team – Building a security project on a budget – jasoncoltrin.com
Installing Kali Linux on ProxMox – Building a Penetration Test Lab – Part 2 – jasoncoltrin.com
Creating bootable Windows USB from Linux
EnhanceIO block cache – howto and benchmark
Tips for optimizing disk performance on Linux
Sysadmin Open Source Landscape
Building a penetration test lab – Part 1 – jasoncoltrin.com
Clonezilla – identify original disk size of clone .img image by looking at flat files – jasoncoltrin.com
Network Weathermap – Network Map Tool
Cheap SSD drives: Where to buy them - The Silicon Underground
Killing stuck process | Nbctcp's Weblog
[Analysis] Full Duplex Capture in SCADA and Industrial Control Networks (by Thomas Tannhäuser and Alexander Pirogov)
Famous cryptographers’ tombstone cryptogram decrypted – Naked Security
SNMP-Brute - Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script - KitPloit - PenTest Tools for your Security Arsenal ☣
How an ISO 27001 Foundation course can help build your career path – IT Governance Blog
Organisations need to prepare for “cyber shocks” – IT Governance Blog
Beginners Guide to Burpsuite Payloads (Part 1)
9 Steps to More-Effective Organizational Security
Stuxnet: the father of cyber-kinetic weapons | CSO Online
Intel tells customers to stop using its faulty Spectre patch
6 ways hackers will use machine learning to launch attacks | CSO Online
How to Block USB Storage Devices in Linux Servers
Ketshash - A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs - KitPloit - PenTest Tools for your Security Arsenal ☣
How to remove Windows.old folder | Remko Weijnen's Blog (Remko's Blog)
Spectre attacks: exploiting speculative execution | the morning paper
Meltdown | the morning paper
DashAsBinSh - Ubuntu Wiki
Troy Hunt: Streamlining Data Breach Disclosures: A Step-by-Step Process
The Life of Kenneth: Off-the-Grid Raspbian Repositories
SwishDbgExt - Incident Response & Digital Forensics Debugging Extension - KitPloit - PenTest Tools for your Security Arsenal ☣
Allscripts recovering from ransomware attack that has kept key tools offline | CSO Online
Testing for New Japanese Era – I'm not a Klingon ( )
Ensuring HTTP Strict Transport Security (HSTS) Compliance without System Modification – Powershell Automation – Michael Hansen (CSA/ASA)
PowerShell for Programmers: Basic Syntax – Variables, Objects, and Data Types – Kory Thacher
Azure CLI Image Copy Extension – allows you to copy virtual machine images between regions with just one command. – Microsoft Faculty Connection
Serious about security? Check out Azure Security Center – Microsoft Press blog
Troubleshooting Performance Issues with Cloud Services (PaaS) – Data Collection – Microsoft Azure Cloud Integration Engineering
Spectre mitigations in MSVC | Visual C++ Team Blog
socat as a handler for multiple reverse shells · System Overlord
Top 20 OpenSSH Server Best Security Practices - nixCraft
10 bad DevOps habits to break | The Enterprisers Project
How to deploy TripleO Overcloud (Controller, Compute) on CentOS 7 VMs
macro_pack - Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments - KitPloit - PenTest Tools for your Security Arsenal ☣
U.S. GAO - FDA Medical Device Reviews: Evaluation is Needed to Assure Requests for Additional Information Follow a Least Burdensome Approach
Use PowerShell to create a bootable USB drive from a Windows 10 or Windows Server 2016 ISO – Mike F Robbins
Securosis - Blog - Article
The Tale of the Free-Net, the Cheap Way Dial-Up Users Got Online - Motherboard
The Story of the Trackball, Canada's Earliest Gift to Computing - Motherboard
Spectre and Meltdown: How Cache Works | Hackaday
Finding Out Your Microsoft Office Licence Version | PeteNetLive
The Idiot adds Two Factor Authentication to Proxmox – Jon Spraggins
How TCP Works - MTU vs MSS (by Chris Greer)
Ransomware shuts down Greenfield's Hancock Regional Hospital
The Japanese words for "space" could change your view of the world — Quartz
How to select the right Qualified Security Assessor – IT Governance Blog
Podcast: Ready, set, now go GDPR
How Microsoft tools and partners support GDPR compliance – Microsoft Secure
Security Breaches Don't Affect Stock Price - Schneier on Security
Some Basic Rules for Securing Your IoT Stuff — Krebs on Security
Weekly podcast: Meltdown and Spectre SCADA problems, Apple text bomb and WEF cyber risks – IT Governance Blog
Patch your vulnerabilities now or risk punishment under the GDPR – IT Governance Blog
Is your organisation at risk from a cyber attack? – IT Governance Blog
7 ways ISO 20000 can benefit your organisation – IT Governance Blog
Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems – Microsoft Secure
Amazon seeks HIPAA compliance lead
A technician's view of the GDPR and consent interfaces
The real costs of a data breach – IT Governance Blog
How to write an ISO 22301-compliant business continuity policy – IT Governance Blog
Survey: Nurses, administrators confident organizations can handle breaches
Nahra: Key issues for 2018 privacy and security checkup
$17.2 Million Settlement for Breach Case Involving HIV Info
Post Exploitation in Windows using dir Command
Forensic Investigation of Nmap Scan using Wireshark
3 Years of Consulting: Settling into An Unexpected Career
Is Healthcare Ready to Comply With GDPR? - HealthcareInfoSecurity
Why Some Healthcare Entities Pay Ransoms - HealthcareInfoSecurity
Where to Find Security Holes in Serverless Architecture
Understanding Supply Chain Cyber Attacks
Termux
Which CISO 'Tribe' Do You Belong To?
Living with Risk: Where Organizations Fall Short
Doh!!! The 10 Most Overlooked Security Tasks
A newcomer's guide to the dark web | CSO Online
Contractor hacks former employer, destroys and corrupts data | CSO Online
Listening to the echoes of cybersecurity history | CSO Online
6 reasons you’re failing to focus on your biggest IT security threats | CSO Online
Full disk encryption: do we need it? | CSO Online
What is Zero Trust? A model for more effective security | CSO Online
Spectre and Meltdown explained: What they are, how they work, what's at risk | CSO Online
4n6k: Forensics Quickie: Methodology for Identifying Linux ext4 Timestamp Values in debugfs `stat` Command
SQL Server on Linux and logging
Charlie Munger’s Life as a Financial Independence Blueprint — My Money Blog
Intel admits Spectre patch problems also affect newer Core chips
Linux Foundation Certified Engineer (LFCE) Exam Review #LinuxFoundation @linuxfoundation #Linux #CentOS @sandervanvugt @tecmint #vExpert – vMusketeers
Virtualization The Future: VMFS5 vs VMFS6
Spectre and Meltdown – How to check patches are applied correctly? | viktorious.nl – Virtualization & Cloud Management
How to Check and Patch Meltdown CPU Vulnerability in Linux
EU GDPR and personal data in web server logs – Ctrl blog
Why DevSecOps matters to IT leaders | The Enterprisers Project
VCDX181.com - Supporting TLS v1.2 with PowerShell...
Ansible - IP Sets and DShield Block List - EverythingShouldBeVirtual
Powershell Script to Create Collections with Folder Structure – Cloud & Virtualization Complete Guide
Guider - A System Wide Linux Performance Analyzer
Collaboration in ownCloud/nextCloud with EtherPad and EtherCalc – – Unixblogger –
SPARTA - Network Penetration Testing GUI Toolkit
Kernelci.org automated bisection
Meltdown and Its Networking Equivalents « ipSpace.net by @ioshints
Best Practices Analyzer for Active Directory Domain Services | Microsoft Docs
How to install and setup Docker on RHEL 7/CentOS 7 - nixCraft
How to use Fio (Flexible I/O Tester) to Measure Disk Performance in Linux | WPMojo
Amplify - NGINX Monitoring Made Easy
Daily Mantra [SHIFT]
More microcode madness – VMware recommends NOT patching | JonKensy.com
NBlog - the NoticeBored blog: NBlog January 15 - protecting information in the cloud
My AWS Solution Architect Associate exam experience | viktorious.nl – Virtualization & Cloud Management
Spectre and Meltdown, what do we know about real-life performance impact so far? -
Meltdown and Spectre side-channel attack risk mitigation information from processor, server, and software vendors | TinkerTry IT @ Home
DSHR's Blog: It Isn't About The Technology
RFCrack - A Software Defined Radio Attack Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
DNSExfiltrator - Data exfiltration over DNS request covert channel - KitPloit - PenTest Tools for your Security Arsenal ☣
Splitting 835 Healthcare Claim Payment | Tallan's Technology Blog
Find file names and URL of Windows 10 feature updates on WSUS | >_
Cloud Native Part 6: Security - via @codeship | via @codeship
More Business Travel Tied to More Signs of Anxiety & Depression, Health Risks
Spectre and Meltdown on Oracle Public Cloud UEK - Blog dbi services
Meltdown and Spectre flaws loomed large over CES
AWS Security Checklist & Best Practices | Cloud Astronaut
Intel Microcode for Spectre/CVE-2017-5715 – Real performance loss in ZFS | JonKensy.com
Nutanix Cloud Connect and S3 Encryption - JBcomp.com
XenApp and XenDesktop Service Architecture Poster | Ask the Architect
PowerShell One-Liner to Audit Print Jobs on a Windows based Print Server – Mike F Robbins
Useful links about Meltdown and Spectre | Techbrainblog
The Idiot installs the QEMU agent on a Windows 10 VM on Proxmox – Jon Spraggins
Cuckoo’s Egg – Week 6 Notes – Chris Sanders
How to Emulate Android Apps on Linux
8 Android Settings You Should Change Right Now
Add Table of Contents to Markdown
Vagrant - Fixing Opentable Basebox looking for Windows Plugin
Docker - Getting Started On Windows
Docker - Mounting Windows Directories in Containers
Docker - Running Container As a Service
A Few Thoughts About Nonprofits and Digital Transformation in 2018 | Beth's Blog
Machine Learning - Andrew Ng Week 2 - Big Data Beard
Favorite Windows Shortcuts
Presentation Environment Setup
Vagrant Part 6 - Behind A Proxy Server
Vagrant Part 5 - Installing Your Software
Vagrant Part 4 - Install Boxstarter
Vagrant Part 3 - Provisioning With Chocolatey
Vagrant Part 2 - Provisioning Introduction
Vagrant Part 1 - Easy Virtual Machine Management
U.S. GAO - Information Technology: Agencies Need to Involve Chief Information Officers in Reviewing Billions of Dollars in Acquisitions
The 348,296th Article About Cryptocurrency | Hackaday
First Light: The Story of the Laser | Hackaday
Justin James
Seth's Blog: Getting paid what you deserve
Justin James
100 Outstanding Pieces of Audio for 2017 – Bello Collective
Sixty free lectures from Princeton on bitcoin and cryptocurrencies. Total time 13hr 20min. Links in post. : Bitcoin
Think Intel ME was big? Meet Intel's new flaws: Meltdown and Spectre – Marksei
Spectre and Meltdown: Attackers Always Have The Advantage | Hackaday
Getting a Handle on Meltdown Update Impact, Stay Tuned for Spectre | Hackaday
Meltdown Code Proves Concept | Hackaday
sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) - KitPloit - PenTest Tools for your Security Arsenal ☣
Why you can’t cash out pt 3: Bitcoin is not a Ponzi scheme! It just works like one | Attack of the 50 Foot Blockchain
GSEC vs. CISSP – The Personal Blog of Sean Goodwin
Better GIAC Testing with Pancakes | tisiphone.net
How to increase Linux security by disabling USB support - TechRepublic
These are the cybersecurity concerns that keep execs up at night - TechRepublic
Don't forget to go the 'last mile' on cybersecurity initiatives - TechRepublic
Healthcare groups can be "perfect storm" of vulnerability to hackers - TechRepublic
Wi-Fi security overhaul coming with WPA3 – Naked Security
cSploit Android - The most complete and advanced IT security professional toolkit on Android - KitPloit - PenTest Tools for your Security Arsenal ☣
Spectre/Meltdown on Oracle Public Cloud UEK - PIO - Blog dbi services
Will technology companies be ready for the NIS Directive by May 2018? – IT Governance Blog
Upcoming webinar: GDPR compliance: getting everyone in the organisation on board – IT Governance Blog
What you need to know about data flow mapping under the GDPR – IT Governance Blog
ACE - Automated, Collection, and Enrichment Platform - KitPloit - PenTest Tools for your Security Arsenal ☣
Salamandra - Spy Microphone Detection Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Archery - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
SNMPwn - An SNMPv3 User Enumerator and Attack tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Anubis - Subdomain Enumeration And Information Gathering Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Wapiti 3.0.0 - The Web-Application Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
When Did IT Practitioners Lose Their Curiosity? « ipSpace.net by @ioshints
Book Review: Clean Architecture | Adventures in the programming jungle
Storaji - A Free, Modern Lightweight Inventory Management System
Cybersecurity: Time for a New Definition - Lawfare
How to Install Snipe-IT Asset Management Software on Debian 9
Raspberry Pi Zero WH SBCs Are Now Available with Professionally Soldered Headers
The unexpected benefits of ISO 27001 – IT Governance Blog
Essential guidance to prevent business continuity disasters – IT Governance Blog
Understanding PCI compliance auditing – IT Governance Blog
IOActive Labs Research: SCADA and Mobile Security in the IoT Era
GDPR: What US Healthcare Entities Need to Know
Rising Attack Vector for Industrial IoT: Smartphone Apps
3 more little-known secrets about cloud security | CSO Online
Board cybersecurity field trips | CSO Online
How to Configure Suricata IDS in Ubuntu
Patch Now or Risk GDPR Fines Later, Regulator Warns
8 simple ways to promote team communication | Opensource.com
A Step in the Right Direction: House Passes the Cyber Vulnerability Disclosure Reporting Act | Electronic Frontier Foundation
Markets Rise and Fall: Is Your Portfolio Ready For Both? — My Money Blog
How to write a job description for a chief information security officer | CSO Online
Thinking Smartly About Smart Contracts | DennisKennedy.Blog
CISOs' Cyber War: How Did We Get Here?
'Back to Basics' Might Be Your Best Security Weapon
Encrypt Tablespaces – Multitenant | EzDBA – BLOG
Oracle Linux patches for Meltdown and Spectre information – Oracle 48
Akiee - Rockiger
Spectre and Meltdown, Oracle Database, AWS, SLOB - Blog dbi services
Benchmarking Linux With The Retpoline Patches For Spectre - Phoronix
This is what a 50-qubit quantum computer looks like
Automating the detection of Mimikatz with ELK – JP
ADRecon - Tool Which Gathers Information About The Active Directory - KitPloit - PenTest Tools for your Security Arsenal ☣
LaZagne v2.3 - Credentials Recovery Project - KitPloit - PenTest Tools for your Security Arsenal ☣
How to achieve an effective risk assessment – IT Governance Blog
Ed Amoroso on CISOs' Challenges in 2018 - HealthcareInfoSecurity
Network Packet Forensic using Wireshark
How to develop a robust cyber security policy – IT Governance Blog
What Global Manufacturers Need to Know About Security in the Cloud
Serious Meltdown and Spectre Flaws Make CPUs Exploitable
Hack the Basic Penetration VM (Boot2Root Challenge)
TCP & UDP Packet Crafting with CatKARAT
Spectre? Meltdown? F*CKWIT? Calm down and make yourself some tea
Apple fixes the Meltdown and Spectre flaws in Macs, iPhones, and iPads
Bitcoin proving big hit in Japan - Japan Today
Errata Security: Some notes on Meltdown/Spectre
Errata Security: Why Meltdown exists
Errata Security: Let's see if I've got Metldown right
How to Assess a Vendor's Data Security | Electronic Frontier Foundation
Google Online Security Blog: More details about mitigations for the CPU Speculative Execution issue
Spectre and Meltdown: What you need to know going forward | CSO Online
Vulnerability Management: The Most Important ...
The hackers are coming: 6 cloud computing trends you will see in 2018 | CSO Online
The Top Four Exception Tracking Services - via @codeship | via @codeship
Improve SAP BW Performance by Applying the Flat Cube | Running SAP Applications on the Microsoft Platform
How the Cloud Delivers Greater ROI than On-Prem IT Solutions | ProfitBricks Blog
Radiology Roundup: Insights on Emerging Trends
5 Trends that Will Shape Radiology in 2018
DSHR's Blog: Meltdown & Spectre
New Tool – Disk Hogs | Keith's Consulting Blog
Justin James
Open Source with Christopher Lydon - Christopher Lydon in conversation on arts, ideas and politics
GitHub - ossu/computer-science: Path to a free self-taught education in Computer Science!
Real World Computing: Archiving Mailboxes in the Office 365 World
Analyzing credit card transactions using machine learning techniques – 2 – David Vassallo's Blog
Selecting a Cloud Provider - Code as Craft
3 New Year's Rituals for Nonprofit Professionals To Begin 2018 with Clarity | Beth's Blog
Bullet Journal - The Analog System for the Digital Age
2017: Year of the data breach
Ex-NSA contractor will plead guilty to stealing 50TB of data
Podcast 370 - Cord Cutting Special - Todd Klindt's SharePoint Admin Blog
Mapping the VCDX Defense Genome Part 3: Is All Flash a Trap?! – vMusketeers
About CPU bug aka #Meltdown / #Spectre | >_
Making Ubuntu on Windows a bit more Authentic (by fixing the font)
Get the content of the WindowsUpdate log as an object | >_
BakAndImgCD - home
Docker Security & Container Security Platform | Twistlock
Xamarin Android Player - Xamarin
Building a NAS
Linux resolutions for 2018 | Network World
The Best Free Microsoft Office Calendar Templates for the New Year
IPv6 Address Primer | manski's blog
Attacking Read-Only Domain Controllers (RODCs) to Own Active Directory – Active Directory Security
Windows Incident Response: WindowsIR 2017
Tuning Windows 10 Part 4: Deploying the golden image -
5 keys to create a killer CLI in Go
Packet Crafting with Colasoft Packet Builder
How to keep ahead of evolving cyber threats – IT Governance Blog
Writing effective scripts using VMware PowerCLI | Adventures in a Virtual World
Setting up a Used Tyan S7012 - My Wired House
Why Employers Must Stop Requiring College Degrees For Middle-Skill Jobs
BlueMaho v090417 - Bluetooth Security Testing Suite - KitPloit - PenTest Tools for your Security Arsenal ☣
Healthcare Exchange Standards: HIE Future is Bright - stepping into 2018
Guide: 1356/1366 Xeon Aftermarket Heatsink Selection/Installation | ServeTheHome and ServeThe.Biz Forums
+++
Heatsink for Tyan s7012 inside Supermicro SC826 | ServeTheHome and ServeThe.Biz Forums
Tyan s7012
4 tips for achieving better ISO 27001 audit results – IT Governance Blog
What’s New in Performance: vSphere 6.5 | Ryan Birk – Virtual Insanity
“The Spaceship” 2.0 | PeterMarks.info
Capita legs
Spaceship Modifications | PeterMarks.info
Security Planner
vSphere Troubleshooting Series: Part 6 – Network Troubleshooting | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 5 – Storage Troubleshooting | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 4 – Virtual Machine Troubleshooting | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 3 – vSphere Installation Troubleshooting | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 2 – vSphere Troubleshooting Tools | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 1 – Introduction | Ryan Birk – Virtual Insanity
In defense of job titles - SysAdmin1138 Expounds
Six healthy and delicious cookbooks to start the new year off right, top picks under $30 | 9to5Toys
SQL Vulnerability Assessment now available for SQL Server 2012 and up | SQL Server Security Blog
SQL Server DBA Morning Health Checks – Sam Lester – SQL Server & BI Premier Field Engineer
Building a vSphere 6.5 Home Lab
2017’s biggest cybersecurity facepalms
Fsociety Hacking Tools Pack - A Penetration Testing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
TeamworkIQ: Automate Processes With Intelligent Checklists. Far Easier Than Workflow Software.
DHCP Penetration Testing
OpenStack basics: An overview for the absolute beginner - OpenStack Superuser
HTTP Security Headers – JP
Using Elastic Curator To Clean Up ELK – JP
GitHub - elastic/curator: Curator: Tending your Elasticsearch indices
Your Mind's Software is More Important Than Its Hardware
How to Find All Failed SSH login Attempts in Linux
2017 Year in Review: The Rise of Kubernetes in the Cloud
Step-by-Step Guide to Doing a Balance Transfer on Credit Cards
Understanding Complexity – Bitgenics
CSIRO PUBLISHING | Journal of Primary Health Care
Cynefin framework
How to Solve the Most Common Dishwasher Problems
A tool to help dashboard creation - virtual red dot
WPHardening v1.6 - Fortify the security of any WordPress installation - KitPloit - PenTest Tools for your Security Arsenal ☣
5 Trends Cybersecurity Practitioners Must Address in 2018
2017: The Year of Breaches, Failing PII, and the Voice Movement - Pindrop
How To Navigate Directories Faster In Linux - OSTechNix
High Value Scenarios – 4-Step Load Test – Chris’s Performance Testing Blog
White House Website Moves to WordPress From Drupal
Cyberattack forces New York State hospital to run on downtime procedures
DSHR's Blog: Why Decentralize?
Casteyanqui.com | Electric Vehicles
Distributing Operational Knowledge Across a Team - via @codeship | via @codeship
4 Years After Target, the Little Guy is the Target — Krebs on Security
19 Keto Lunches That Will Help You Stick to Your Resolutions
The Disconnect Between Cybersecurity & the C-Suite
Password reset - Tiny Tiny RSS
Hunting Rogue Access Points with the ESP8266 | Hackaday
How to Configure Linux for Children - Make Tech Easier
Beyond the Repository: Clinical Benefits of a VNA
Twinax - Cheap, Cheerful and Annoyingly Chubby - MovingPackets.net
Auditing Kubernetes for Secure Configurations - Blog | Tenable™
Kubernetes 101 Fundamentals
Even With the Cloud, Client Security Still Matters · System Overlord
Why Healthcare Cybersecurity Spending Is Rising
Tutorial on how to create a paper and digital offline Bitcoin wallet with Linux - LinuxConfig.org
PiKarma - Detects Wireless Network Attacks - KitPloit - PenTest Tools for your Security Arsenal ☣
Temperature and Humidity Sensor | Nbctcp's Weblog
Happy IR in the New Year! - Securelist
Fancy Labels and References in LaTeX – texblog
Viewing YUM variables using python - mikep
Approaches to International Cyberlaw: A View from Israel - Lawfare
Restore Corrupted USB Drive To Original State In Linux - LinuxAndUbuntu - Linux News | Apps Reviews | Linux Tutorials HowTo
How to Install Attendize on Ubuntu 16.04 – RoseHosting Blog
Building a Hacking Kit with Raspberry Pi and Kali Linux
The Role of Change Management in Maximizing Health IT Investment
Get Inspired to Transform Enterprise Imaging [eBook]
Let Enterprise Imaging Tell the Whole Patient Story
Protect Your Network With a Bastion Host in Just 3 Steps
Username Anarchy - Username Tools For Penetration Testing - KitPloit - PenTest Tools for your Security Arsenal ☣
Qubes OS - A Security-Oriented Operating System - KitPloit - PenTest Tools for your Security Arsenal ☣
Imaging Technology: 6 Traits Radiologists Should Demand from Vendors
NHS steps up its cyber security defences – how are you preparing for the NIS Directive? – IT Governance Blog
GDPR Report: Many organisations have already appointed a DPO – IT Governance Blog
HOWTO: Automate One-A-Day Photography – Please Work
How to Effectively Use Storytelling in Sales
Blog
Accenture-Cyber-Risk-Convergence-Of-Operational-Risk-And-Cyber-Security.pdf
hit-ehr-nist-sp1800-1c-draft.pdf
CISOs Play Rising Role In Business
Load Balancing Medical Imaging & Information System Protocols - Medical_Imaging_Systems_Deployment_Guide.pdf
PACS of the Future Tested, Successful | Medical Imaging Talk Blog
Draft_v7 - dttl-fsi-TransformingCybersecurity-Infographic-2014-02.pdf
Cognitive Risk Framework for Cybersecurity part II | The GRC Bluebook
Cognitive Risk Framework for Cybersecurity | The GRC Bluebook
"Mystery" Buyer Revealed: Swiss National Bank's US Stock Holdings Rose 50% In First Half, To Record $62BN | Zero Hedge
The Swiss National Bank Owns $80 Billion In US Stocks - Here's The Catch | Zero Hedge
Test Driving Docker Function as a Service (FaaS)
Check Adobe Flash version Internet Explorer (Active-X) on Server 2012/2016 and Windows 8.1/10 - renshollanders.nl
DOS Attack Penetration Testing (Part 2)
BruteSpray v1.6.0 - Brute-Forcing from Nmap output (Automatically attempts default creds on found services) - KitPloit - PenTest Tools for your Security Arsenal ☣
DexterPOSH's Blog: Test connectivity via a specific network interface
DexterPOSH's Blog: PowerShell : Nested Remoting (PSRemoting + PSDirect)
How to use WinRM & PowerShell with Jenkins
DexterPOSH's Blog: Vagrant using Hyper-V
Setting the Default Wallpaper for Windows 10 during ConfigMgr OSD – smsagent
DexterPOSH's Blog: PowerShell : Retry logic in Scripts
A CIO Discusses Top 2018 Security Challenges in Healthcare
DexterPOSH's Blog: PowerShell + AD + Pester : create new user using template Part 2
DexterPOSH's Blog: PowerShell + AD + Pester : Create new user using template - Day 1
Parsing the WindowsUpdate.log using PowerShell and regex -
PowerShell – easily posting scripts to a website while maintaining syntax highlighting by copying as HTML | blog.bjornhouben.com
Create and reuse a powershell scriptblock - LazyWinAdmin
Troubleshooting ELK Elasticsearch & Logstash Pt 1 of 2 - Syspanda
Troubleshooting ELK Elasticsearch & Logstash Pt 2 of 2 - Syspanda
Security Awareness Training: Step-By-Step - Syspanda
Logstash Master Script for ELK Health monitoring - Syspanda
Collecting and sending Windows Firewall Event logs to ELK - Syspanda
Brocade SAN Switch commands that prove to be very useful | 50mu - about storage
Free Dell EMC trainings | 50mu - about storage
Useful EMC VMAX CLI commands | 50mu - about storage
Return of the Borg: How Twitter Rebuilt Google's Secret Weapon | WIRED
Graphite
Prometheus - Monitoring system & time series database
Script Synchronize all WSUS servers
Installing and Configuring WSUS with Powershell – smsagent
Securing Picture Archiving and Communication System | NCCoE
Difference Between kVA and kW | Difference Between
microsoftramblings – Stuff I'm trying to figure out about Microsoft products, mainly SCCM (ConfigMgr)
Patching Production servers with WSUS & Powershell - Syspanda
Force WSUS to Synchronize Now from PowerShell – PowerShell, Programming and DevOps
GOSINT - Open Source Threat Intelligence Gathering and Processing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
GOSINT
Virtual machine application runs slower than expected in ESXi (1018206)
WSUS - Server Clean Up Using Powershell - TechyGeeksHome
Function Router -- A "CDN" for Serverless, function as a service, functions, lambda, openwhisk
Function as a Service for Docker – Chanwit Kaewkasi – Medium
Automated WSUS Maintenance - PowerShell Script (Update 1.6)
Walkthrough: Building a Windows 10 1709 (Fall Creators Update) Reference Image with Microsoft Deployment Toolkit – Stick To The Script!
From Zero to 10 – Windows 10 Deployment Round-up – Stick To The Script!
PowerShell: Create Active Directory Users In Bulk (Update 1.5) – Stick To The Script!
How to easily Check your SPN and Delegation settings for SQL Server in an Active Directory environment – A Windows System Admin's Blog
Fixing the randomly stopping WsusPool IIS Application pool and Windows Updates failed 0x80244022 error – A Windows System Admin's Blog
Get a list of users in Active Directory who have not logged in for specified number of days using PowerShell – A Windows System Admin's Blog
How to allow an Active Directory Certificate Authority to generate Certificates with a Subject Alternative Name attribute – A Windows System Admin's Blog
sysadvent: Day 25 - How to choose a data store for the new shiny thing
Use GMail to send system mails on Debian · The Hacking Memento
Building And Installing Rockbox · The Hacking Memento
SW N-Central Trial Form - Gilfoyle
GitHub - MasashiTeruya/Install-WSUS: This is trivial powershell module to install WSUS(Windows Server Update Services).
PowerShell: Automated WSUS Maintenance (Update 1.6) – Stick To The Script!
WSUS – A Windows System Admin's Blog
Free Tools Library - SDM Software | Configuration Experts
How to check the PowerShell version & install a new version – Mike F Robbins
Setting up a Jekyll workflow on windows · Michael McKenna
VESA Announces DisplayHDR Specification: Defining HDR Capabilities In Performance Tiers
NVIDIA's AI will help GE speed up medical image processing
How to retrieve currently applied GPOs on your local machine using WMI via Windows Scripting Host ( WSH ) – Azure Active Directory Developer Support for MS Graph and AAD Graph
Secure Coding Standards | The CERT Division
Mitigating the Insider Threat - Building a Secure Workforce - fissea-conference-2012_mahoutchian-and-gelles.pdf
Insider Threat Best Practices | The CERT Division
GitHub - google/kubeflow: Machine Learning Toolkit for Kubernetes
The Housing Bubble Blog » A Repeat Of An Earlier Situation
Bluepot - Bluetooth Honeypot - KitPloit - PenTest Tools for your Security Arsenal ☣
@ISACA Volume 24 | 29 November 2017
Access denied to Administrative (Admin) shares in Windows 8 – 4sysops
Windows 7 Access Denied For Administrator | Think Like A Computer
Security Education in Uncertain Times: 2017 in Review | Electronic Frontier Foundation
PowerShell – Using psexec to automate UI tasks on remote machines – Codingbee
veewee/installation.md at master · jedi4ever/veewee · GitHub
DOS Attack Penetration Testing (Part 1)
Audit/Assurance Programs
A New Utility for Diagnosing and Repairing Problems with the WMI Service
(5) T312 Burping for Joy and Financial Gain Tim lanmaster53 Tomes - YouTube
Group Policy and WMI, A Wonderful Combination - Simple Talk
(5) Tips and Techniques to Adopt GDPR using COBIT 5 - YouTube
A Machine Learning Tutorial with Examples | Toptal
What's New in Visual Paradigm?
TheHive Project
Edward Snowden Introduces Baby Monitor for Spies | Hackaday
iPod 5th gen SSD upgrade - My Wired House
What is Pulp, Candlepin, Foreman, and Katello – Justin Garrison – Medium
ServerMonkey Specials | Save Your Banana Peels! | ServerMonkey.com
Install Katello on CentOS 7 | Lisenet.com :: Linux | Security | Networking
Deployment Research > Research
Reviewing auditd logs with Spacewalk | devops-blog
Taskwarrior - What's next?
Advice on building Docker images on Windows | devops-blog
Spacewalk vs. Katello | devops-blog
osquery Across the Enterprise – Palantir – Medium
Ins and Outs of Anonymous Access | IT Pro
16 Tips for Creating Better Network Diagrams
Error Message Explained: User Profile Service Failed the Logon • Helge Klein
Group Policy - GPResult Examples - The Sysadmins
Driver Automation Script - Automate Driver Downloads/Installation in MS Intune
How to Back Up and Restore a MySQL Database
David Clunie's Blog: How many (medical image exchange) standards can dance on the head of a pin?
Kea With MySQL Cluster Backend – Test Report | Internet Systems Consortium
Netflix's move to Amazon EC2 - PrudentCloud
Docker Blog Series Part 5 – Understanding new container management features in Service Fabric – Monub
SQL Server High Availability Options
PACSHealth® :: Home
WhatWaf - Detect And Bypass Web Application Firewalls And Protection Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
GOWPT - Go Web Application Penetration Test - KitPloit - PenTest Tools for your Security Arsenal ☣
JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Wazuh - Open Source Host and Endpoint Security - KitPloit - PenTest Tools for your Security Arsenal ☣
CALDERA - Automated Adversary Emulation System - KitPloit - PenTest Tools for your Security Arsenal ☣
OWASP ZAP 2.7.0 - Penetration Testing Tool for Testing Web Applications - KitPloit - PenTest Tools for your Security Arsenal ☣
wildPwn - Brute forcer and shell deployer for WildFly (JBoss AS) - KitPloit - PenTest Tools for your Security Arsenal ☣
Linux Expl0rer - Easy-To-Use Live Forensics Toolbox For Linux Endpoints - KitPloit - PenTest Tools for your Security Arsenal ☣
CryKeX - Linux Memory Cryptographic Keys Extractor - KitPloit - PenTest Tools for your Security Arsenal ☣
How to See Which Group Policies Are Applied to Your PC and User Account
MyDLP
OpenSOC · GitHub
Key Notes on Data Protection in the Cloud   | Trevor Templar
Four mistakes that can kill virtual machine performance
SOMAP.org - Information Security Governance, Risk and Compliance Tool
Mohannad hussain dicom and imaging tools
PacsOne Server DICOM 3.0 Conformance Statement
Journal Paper Format - 22.pdf
Avast open-sources its machine-code decompiler
2011-dcca-basic-10010160.pdf
Starting an InfoSec Career – The Megamix – Chapters 4-5 | tisiphone.net
Moving a LVM Partition from Proxmox to VMWare, lvdisplay mapped size changed, why? | ServerfaultXchanger | QueryXchanger
Readings | Ethics and the Law on the Electronic Frontier | Electrical Engineering and Computer Science | MIT OpenCourseWare
Plant-astic Plant Based Meal Plan | Whole Foods Market
How to get Antivirus information with WMI (VBScript) – Decrypt my World
Insider Threat Mitigation Guidance - insider-threat-mitigation-guidance-36307
Baldrige Cybersecurity Excellence Builder v1.0 March 2017 - baldrige-cybersecurity-excellence-builder-v1.0.pdf
The curious Kabri | Catching up on the IT industry after years in Enterprise IT
On Attending DefCon – Jon Spraggins
Metadefender: A More Private Alternative to VirusTotal | OPSWAT Blog
Setting up Kali Linux in Docker on Windows 10 – Positive Security
Windows Security Center: Fooling WMI Consumers | OPSWAT Blog
GitHub - modulogrc/modSIC: Modulo's Open Distributed SCAP Infrastructure Collector, or modSIC, makes it easier for security analysts to scan an environment vulnerabilities based on OVAL-Definitions. It's an open-source service specialized in distributed network assessments.
Nemsec Cyber Security
Compliance Features in Office 365 | Office 365 Platform Service Description
The curious Kabri | Completely free IT training resources to help diversify your IT career
DICOM introduction and free software
Easy Keto Lasagna - Hey Keto Mama
5 Minute Spicy Tuna Rolls - Hey Keto Mama
Fhir tooling (grahame)
Home - Radiolab
Nasuni-2015-State-of-Cloud-Storage-Report.pdf
Nasuni-White-Paper-State-of-Cloud-Storage-2013.pdf
Kong - Open-Source API Management and Microservice Management
CISSP QOTD
8 Largest Group Purchasing Organizations for Hospitals
mozilla/ssh_scan - A SSH configuration and policy scanner
Using ElastAlert to Help Automate Threat Hunting – JP
The Weirdest Programming Principles You've Never Heard Of
How Should International Law Treat Cyberattacks like WannaCry? - Lawfare
The IT Security Lessons from 2017
Active/Passive MySQL High Availability Pacemaker Cluster with DRBD on CentOS 7 | Lisenet.com :: Linux | Security | Networking
HeRM's - A Commandline Food Recipes Manager - OSTechNix
Slideshow-Deslidefier
How to create mobile-friendly documentation | Opensource.com
sysadvent: Day 22 - Building a secure bastion host, or, 50 ways to kill your server
Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges
List of data breaches and cyber attacks in December 2017 – 33.8 million records leaked – IT Governance Blog
A List of Machine Learning (Ab)use Cases
Replace broken hard drive in software RAID1 « Technical blog on UNIX, Linux, Android etc.
Grabber! Like a Petit Pimouss'
4 ways Companies can make remote working successful
Basic Python Script to Log in to Website Using Selenium Webdriver | Lisenet.com :: Linux | Security | Networking
Must use, must know WinDbg commands, my most used – benjamin perkins
Wrapping up a year in healthcare: WannaCry, NHS Digital and the General Data Protection Regulation (GDPR) – IT Governance Blog
Oracle Licensing (R)evolution
New Year’s resolutions for CISOs | CSO Online
2017 Health Data Breach Tally: An Analysis - HealthcareInfoSecurity
Cyber security professionals lack the training to complete their daily tasks – IT Governance Blog
Be a More Effective CISO by Aligning Security to ...
What are the current pain points of osquery? | Trail of Bits Blog
NBlog - the NoticeBored blog: NBlog December 21 - auditor independence [LONG]
Monitoring Home Power Consumption for less than $25
How to Talk to Your Family About Digital Security | Electronic Frontier Foundation
Cybersecurity tips that are cost-effective and efficient
How To Tell If Your Linux Server Has Been Compromised
Linux Foundation Certified Systems Administrator (LFCS) Exam Review #LinuxFoundation @linuxfoundation #Linux #CentOS @sandervanvugt @tecmint #vExpert – vMusketeers
2018 Application Performance Management Predictions - Part 3 | APMdigest - Application Performance Management
2018 Application Performance Management Predictions - Part 2 | APMdigest - Application Performance Management
2018 Application Performance Management Predictions - Part 1 | APMdigest - Application Performance Management
sysadvent: Day 20 - Regarding the Responsibility of Systems Administrators
The 10 Best Cybersecurity Books Everyone Should Read
Windows unquoted search path fix - The Silicon Underground
Malware hit these 3 verticals the hardest in 2017 - TechRepublic
Troy Hunt: Fixing Data Breaches Part 3: The Ease of Disclosure
Troy Hunt: Fixing Data Breaches Part 2: Data Ownership & Minimisation
Troy Hunt: Fixing Data Breaches Part 1: Education
Analyse Cisco ASA Firewall Logs with Graylog | Lisenet.com :: Linux | Security | Networking
How to use Apache reverse proxy as Load Balancer - LinuxTechLab
Why Siemens sees data privacy as a competitive advantage
Healthcare Security: Going Beyond ComplianceWebinar.
HHS Attempts to Clear Up HIPAA Confusion on PHI Release
Understating Guide of Windows Security Policies and Event Viewer
Key steps to GDPR compliance – Part 3 – IT Governance Blog
Free ISO 27001 resources – IT Governance Blog
Creating a culture of security: Part 2 | CSO Online
7 cyber security predictions for 2018 | CSO Online
Automate OVM deployment for a production ready Oracle RAC 12.2 architecture – (part 02) - Blog dbi services
Automate OVM deployment for a production ready Oracle RAC 12.2 architecture - (part 01) - Blog dbi services
Book Recommendation: Oracle Database Upgrade and Migration Methods
How to Properly Enable HTTPS on Nginx with Let's Encrypt on Ubuntu 16.04/17.10
Real World Computing: The Year in Review (2017)
SEI CERT Oracle Coding Standard for Java - SEI CERT Oracle Coding Standard for Java - Confluence
SEI CERT Coding Standards - Secure Coding - Confluence
Healthcare Risk Management Key Area in New HITRUST Program
Disposable Infrastructure Part 1: Building Your Vagrant Control Node
SPIE_200204117_Workstation.pdf
GitHub - zentralopensource/zentral: Zentral is a framework to gather, process, and monitor system events and link them to an inventory.
House committee calls on HHS to improve medical device cybersecurity with supply chain transparency | FierceHealthcare
Best Practices for Securing Active Directory | Microsoft Docs
Why Metrics Must Guide Your DevOps Initiative | APMdigest - Application Performance Management
Detecting Kerberoasting Activity Part 2 – Creating a Kerberoast Service Account Honeypot – Active Directory Security
Ten Commandments from Entrepreneurial 'Evangelist' Guy Kawasaki - Knowledge@Wharton
GitHub - morph027/pve-iso-2-pxe: Create PXE bootable Proxmox installation
VDiscover: large-scale vulnerability discovery using Machine Learning
SOMAP.org - Security Officers Management and Analysis Project
Using PowerShell to disable or remove SMB1
Using PowerShell to test whether hotfixes is installed
Slides, demos and videos from PowerShell Conference Europe 2017
janegilring (Jan Egil Ring) · GitHub
Cross-platform Lightweight Performant Host Visibility
How to Tune Java Garbage Collection | CUBRID blog
How to Get Notified When Your Ubuntu Box Needs Security Updates
Framework Overview ITGIG (update) - 05_Implimenting_NIST_Cybersecurity_Framework_Using_COBIT5_Tom_Conkle.pdf
All About Stuff: webMethods and other servers Java Memory Settings
SMART C-CDA Scorecard
Sokanu
GitHub - RSS-Bridge/rss-bridge: The RSS feed for websites missing it
Key Steps to GDPR Compliance – Part 2 – IT Governance Blog
GDPR Overview
Penetration tests could have spared NHS from WannaCry – IT Governance Blog
Mandatory documentation for ISO 22301 – IT Governance Blog
ISO 22301
JBoss Performance Tuning part 1
JBoss AS 7 Performance tuning
Open Source and Enterprise Architecture: JVM Performance Tuning
Web design and development articles and tutorials for advent ◆ 24 ways
COBIT 5 for cyber security: want to know more? – IT Governance Blog
WMI, Query Windows SecurityCenter2
The Mirth Open Source Portal
COBIT vs ITIL vs TOGAF: Which Is Better For Cybersecurity?
Running Systems » Blog Archive » Connecting EMC/NetApp shelves as JBOD to a Linux machine
Vendor Management in the Spotlight – The Personal Blog of Sean Goodwin
Book Review: The Book of Five Rings – The Personal Blog of Sean Goodwin
My CISSP Success Story – The Personal Blog of Sean Goodwin
Memory Tuning for Java Application Servers | rsingh
Packbot-P Summary Design and SOW - ML-advice.pdf
Virtual Machine Optimization - Userful Support
Information Security Travel Guide: Tips for Traveling
Home - Arachni - Web Application Security Scanner Framework
en – NetApp Monitoring Blog
SANS Digital Forensics and Incident Response Blog | Automated Hunting of Software Update Supply Chain Attacks | SANS Institute
WinRM problems – Luka Gros
Enable nested virtualization on Google Cloud | Open-Source Routing and Network Simulation
Significant Changes Coming to NIST Cybersecurity Framework
An introduction to Joplin, an open source Evernote alternative | Opensource.com
How to Easily Boost Ubuntu 16.04/17.10 Network Performance by Enabling TCP BBR
How to Transfer Your Steam Games From One PC to Another | iceflatline
How to optimize your cloud strategy – Azure Government Cloud
Comparing cloud vs on-premise? Six hidden costs people always forget about
Install SQL Server 2017 Using PowerShell Desired State Configuration and SqlServerDsc – PowerSQL
joeware – never stop exploring… :) » Blog Archive » Active Directory… 18 Years Old… But Do Your App Vendors and Developers Even Know How To Use It Properly?
What You Need To Know About The Intel Management Engine | Hackaday
6 open source home automation tools | Opensource.com
Monitoring Tomcat with Nagios Core and jmx4perl | Lisenet.com :: Linux | Security | Networking
A few cybersecurity predictions for 2018 | CSO Online
5 tips for better NGINX security that any admin can handle - TechRepublic
Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job
Docker : My First Steps | The ORACLE-BASE Blog
8 Critical 401(k) Questions You Need to Ask Your Employer
How To Detect And Find Hidden Cameras In Your Airbnb Rental - foXnoMad
OpenCV Never Forgets a Face | Hackaday
ize it by match
vSphere Permission cleanup - LucD notes
Even unmanaged EdgeMax EdgeRouters can be managed with new UNMS (Ubiquiti Network Management System) free beta, no UniFi required! | TinkerTry IT @ Home
A Fistful of Dongles: The Glaring Omission in Your Incident Response Planning
Technical Professions Progress from Magical to Boring
Wordpress: Redirect HTTP to HTTPS in Apache | UITS Linux Team
Downloading SharePoint Patches with PowerShell - Todd Klindt's SharePoint Admin Blog
Henry Ford Health System data breach compromised data of nearly 20,000 patients
Security Onion Configuration in VMware
Antifragile Management and the End of the Annual Performance Review » Public Libraries Online
Why is IT Security winning battles, but losing the war...? - Balabit Blog
Mecklenberg, N.C. county officials consider paying cyberattacker's ransom demand
Cybersecurity’s Dirty Little Secret
Testssl.sh - Testing TLS/SSL Encryption Anywhere on Any Port
How to manage firewallD (on CentOS 7 and all the other distro) – Marksei
SQL Vulnerability Assessment Available in SSMS - Thomas LaRock
PLCs in Your Browser | Hackaday
2 Easy Ways to Encrypt Dropbox on Ubuntu 16.04/17.10 (Desktop & Server) | LinuxBabe
When is a 10-bit A/D an 8-bit A/D? | Hackaday
Authenticate Oracle database users against AD, in practice – Oracle 48
How to use DNSenum to scan your server's DNS records - LinuxConfig.org
Cloudian Announces HyperFile, Makes Object Better | penguinpunk.net
An Introduction to Machine Learning through Microsoft ML – Microsoft Faculty Connection
Stability and Change – Why and How to adopt WaaS. – PowerInTheShell
Cloud Native Part 3: DevOps - via @codeship | via @codeship
Visualizing your Solutions: Mind Maps and Wireframe Diagrams – DiscoPosse.com
Encryption’s role in GDPR compliance and cloud data security | ITProPortal
Kaspersky Security Bulletin: Review of the Year 2017 - Securelist
Cybersecurity for Electronic Devices | US-CERT
Holiday Traveling with Personal Internet-Enabled Devices | US-CERT
On the Demise of Linux Journal - Noah Meyerhans
In practice: How customers are using Shielded Virtual Machines to secure data | Windows Server Blog
The best kept secret in cybersecurity for banks | CSO Online
The Effectiveness of Tools in Detecting the 'Maleficent Seven' Privileges in the Windows Environment - effectiveness-tools-detecting-maleficent-seven-privileges-windows-environment-38220
WebGoat Teaches You To Fix Web Application Flaws In Real-time - OSTechNix
Disrupting The Computer Industry Before it Existed: Rear Admiral Grace Hopper | Hackaday
Seth's Blog: Reading at work
Roll-up Board - Visual Studio Marketplace
Protecting Your Website From Application Layer DOS Attacks With mod_evasive
6 steps for GDPR compliance | CSO Online
What is a supply chain attack? Why you should be wary of third-party providers | CSO Online
Cybersecurity professionals aren’t keeping up with training | CSO Online
Index of /docs/Slides/2017
Changing Cybersecurity Regulations that Global Financial Services Firms Need to Know About | CSO Online
5 computer security facts that surprise most people | CSO Online
Department of Defense contractors must implement IT security controls by December 31 | CSO Online
JPCERT/CC Blog: Research Report Released: Detecting Lateral Movement through Tracking Event Logs (Version 2)
The first text message was sent 25 years ago
Sopranica
sysadvent: Day 2 - Shifting Left Securely With inSpec
GitHub - cluberti/VDI: Repository for VDI scripts
Doc Searls Weblog · Requiem for a great magazine
GitHub - peteheist/irtt: Isochronous Round-Trip Tester
Seth's Blog: Your soft skills inventory
Netapp Ontap 9.3 Simulator | SYSADMINTUTORIALS IT TECHNOLOGY BLOG
Cuckoo’s Egg – Week 3 Notes – Chris Sanders
Build a SNES Classic with an Android TV Box
(My) CSSLP Notes – Software Deployment, Operations, Maintenance and Disposal | Adventures in the programming jungle
CSSLP
Monthly Security Patch Program for the vCenter Server Appliance - VMware vSphere Blog
sysadvent: Day 1 - Comfortably Numb - or - “How Corporate Analgesia is Actively Harming You”
GitHub - f4exb/sdrangel: SDR Rx/Tx software for Airspy, BladeRF, HackRF, LimeSDR, PlutoSDR, RTL-SDR, SDRplay RSP1 and FunCube
A look back at cybersecurity in 2017 | CSO Online
First US Federal CISO Shares Security Lessons Learned
Insider threat — Chemours employee steals trade secrets | CSO Online
5 Free or Low-Cost Security Tools for Defenders
Protect your name: how to secure DNS servers? | CQURE Academy
Configuring Quad9 on pfSense – Linux Included
Quad9 – First Thoughts & Benchmarks – Linux Included
IAB Europe releases GDPR user consent technical standard
Automate End-to-End Latency Measurements « ipSpace.net by @ioshints
IDS, IPS Penetration Testing Lab Setup with Snort
WiFi Hacker- WiFi Hacking Software – InfoSecHotSpot
Why You Need a Cybersecurity Incident Response Plan (And How to Create One)
How long to study for CISSP - The Silicon Underground
Upgrade your SQL Server to scale before adding new hardware – MSSQL Tiger Team
ASP.NET Session State with SQL Server In-Memory OLTP | SQL Server Database Engine Blog
Programmatically Creating and Signing Word Documents – Andrew Coates ::: MSFT
Guest Blog | A Mobile DevOps Retrospective, Part III: Measurement, the Last Mile – Visual Studio App Center Blog
This Goal Setting Trick Will Help You Stop Procrastinating
Raible Designs | A Stressful, but Rewarding, Trip to Devoxx Belgium and Morocco
Building a Frankenstein Tablet | Enginoor
Are you ready for containers in your office?
8 Low or No-Cost Sources of Threat Intelligence
Cloud Native Part 2: In Practice - via @codeship | via @codeship
Cloud Native Part 1: Definition | via @codeship
How to Extract Content from VMDK Files
The 10 concerns keeping the C-suite up at night going into 2018 - TechRepublic
Kaspersky Security Bulletin - Story of the year 2017 - Securelist
NBlog - the NoticeBored blog: ISO27k internal audits for small organizations
Developers Can Do More to Up Their Security Game: ...
The Infosec Introvert Travel Blog | tisiphone.net
AWS re:Invent 2017: Serverless Architectural Patterns and Best Practices - ARC401 - WoodITWork.com
AWS re:Invent 2017: Security Anti-Patterns: Mistakes to Avoid - FSV301 - WoodITWork.com
Who Was the NSA Contractor Arrested for Leaking the ‘Shadow Brokers’ Hacking Tools? — Krebs on Security
6 fireable offenses that could cost CISOs their jobs
Antivirus vendors have your data. Can they handle GDPR?
4 Ways to Speed Up SSH Connections in Linux
HDMI 2.1 is here with 10K and Dynamic HDR support
​Linus 'Linux' Torvalds gives security developers guidance | ZDNet
IoT lottery: finding a perfectly secure connected device - Securelist
Evil Tester: What is Agile Testing? The Books List
It’s Bash Scripts All the Way Down (more on CLI versus API) « ipSpace.net by @ioshints
Practical KRACKs - Koen Van Impe - vanimpe.eu
What I learned by attending FOR610: Reverse-Engineering Malware / part 1 - Koen Van Impe - vanimpe.eu
Coinmon - Check Cryptocurrency Prices From Commandline - OSTechNix
Basic Security Tools for Your Risk Management Program
Use Philips Hue as an IDS - Koen Van Impe - vanimpe.eu
Green tea cat-shaped bread - Japan Today
Monitor your Raspberry Pi cluster with Prometheus and Docker
Serverless Kubernetes home-lab with your Raspberry Pis
Using ELK as a dashboard for honeypots
Service, function and capability (again) – Tom Graves / Tetradian
What Is Function-as-a-Service (FaaS)?
Function-as-a-Service Market is Expected to Exceed more than US$ 7.50 Billion By 2021 | Medgadget
Configuring iptables to log network traffic - Alex Scoble's IT Notes - An Information Technology Blog
Management Methods | Management Models | Management Theories
What Is Function-as-a-Service? Serverless Architectures Are Here!
Kubernetes: Fission: Serverless Functions as a Service for Kubernetes
Functions as a Service (FaaS)
Functions as a Service (OpenFaaS) | faas
Functions as a service: the rise of serverless architecture
Introducing Functions as a Service (FaaS)
[Project Description] Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector | CSRC
Automating WSUS 2016 Installation with PowerShell - Petri
Generating patch compliance report from WSUS with PowerShell – microsoftramblings
PowerShell meets WSUS | JeffOps
Opensource PACS | Rady's Inspirations
Active Directory Logon Script – Luka Gros
PowerShell Server Inventory, Part 3: Viewing the Inventory using a UI | Learn Powershell | Achieve More
PowerShell Server Inventory, Part 2: Collecting and Sending Data | Learn Powershell | Achieve More
PowerShell Server Inventory, Part 1: SQL Database Build | Learn Powershell | Achieve More
GitHub - proxb/ServerInventoryReport: A set of scripts to create an inventory report using PowerShell, SQL and WPF
How to install Windows Server features using PowerShell – Server 2012 R2 update
WSUS | Learn Powershell | Achieve More
How to get a list of every WSUS update using PowerShell | The Angry Technician
WSUS–PowerShell Reporting – Luka Gros
Generating HTML Reports in PowerShell – Part 1 – Azure Field Notes Blog
Dockerizing all the things: Running Ansible inside Docker container – Rule of Tech
PowerShell – Remove the WSUS client settings from the registry | JeffOps
PACS Replacements Part 3 – PACS Acceptance Testing « PACS People
ISACA CGEIT training (Certified in the Governance of Enterprise IT) Courseware
Q&A: The Ethics of Using Brain Implants to Upgrade Yourself - IEEE Spectrum
Using Emerging Threats Suricata Ruleset to Scan PCAP
Understanding IoT Security (Part 1 of 3): IoT Security Architecture on the Device and Communication Layers - DZone IoT
Understanding IoT Security (Part 2 of 3): IoT Cyber Security for Cloud and Lifecycle Management - DZone IoT
Securing the Workspace Part 2: A few security basics for your Workspace -
Bruce Charlton's Notions: Universal institutional bloating, the British Disease (caused by micro-managing bureaucracy = totalitarianism)
Punctuation Rules Around Quotation Marks
Samurai stroll - Japan Today
How to Encrypt USB Drive on Linux Using VeraCrypt - LinuxBabe.Com
How to Install MKVToolNix 9.6.0 on Ubuntu 16.04 and 16.10 via PPA
How to Integrate Collabora Online Server with Nextcloud on Ubuntu 16.04
Tips / Solutions for settings up OpenVPN on Debian 9 within Proxmox / LCX containers | Robert Penz Blog
WannaCry happened and nobody called me during my vacation – I tell you why | Robert Penz Blog
Implementing IoT securely in your company – Part 3 | Robert Penz Blog
Implementing IoT securely in your company – Part 2 | Robert Penz Blog
Implementing IoT securely in your company – Part 1 | Robert Penz Blog
How to Install and Use Prey to Protect Your Ubuntu Linux Laptop from Theft - LinuxBabe.Com
A security expert built an unofficial Wikipedia for the dark web
Using Telegraf, InfluxDB and Grafana to Monitor Network Statistics · Lindsay Hill
Healthcare BYOD Security Embraces Cloud, Biometric Authentication
VMWare Security Model
Quad9 9.9.9.9 might be a good Google Public DNS 8.8.8.8 alternative, claims better privacy and features DNSSEC, DNS Benchmark indicates better speeds | TinkerTry IT @ Home
AsciiCam: Make ASCII Art with your Phone | Hackaday
Rehoming the Hyperconverged Home Lab – Virtually Sober
Downloading all the 78rpm rips at the Internet Archive | Richard WM Jones
Keeping a work notebook | Richard WM Jones
TempestSDR: An SDR tool for Eavesdropping on Computer Screens via Unintentionally Radiated RF
Why Quality Customer Service Always Starts with a Smile
STIG Compliance with SCAP and DCM in Configmgr - AnthonyOnAzure
Configmgr SQL Server Sizing and Optimization - AnthonyOnAzure
How many disks can you add to a (virtual) Linux machine? | Richard WM Jones
Risk, Process, and Balance – Russell Ballestrini
Securely publish Jenkins build artifacts on Salt Master – Russell Ballestrini
Minikube – Russell Ballestrini
Selenium grid on Kubernetes – Russell Ballestrini
Configuration Management and the Golden Image – Russell Ballestrini
The Three Deployment Management Strategies – Russell Ballestrini
Configuration Management vs Remote Execution – Russell Ballestrini
Postfix Salt State Formula – Russell Ballestrini
How to reset HP iLO Lights-Out User and Password Settings with IPMItool – Russell Ballestrini
Understanding Salt Stack user and group management – Russell Ballestrini
Tips for getting pull requests approved – Russell Ballestrini
My top five suggestions for an independent developer creating a new product or service – Russell Ballestrini
Create your own fleet of servers with Digital Ocean and salt-cloud – Russell Ballestrini
Add a custom header to all Salt managed files using pillar and jinja templates – Russell Ballestrini
How to save hundreds of dollars on groceries without clipping coupons – Russell Ballestrini
How to rescue logs and config from a failed Citrix NetScaler App Gateway – Russell Ballestrini
Block cipher lab – Russell Ballestrini
Career development is a game of chutes and ladders – Russell Ballestrini
How to capture HTTPS SSL TLS packets with wireshark – Russell Ballestrini
PowerShell – Find the appropriate network packet (MTU) size
PowerShell – Is hyperthreading enabled? | JeffOps
vCenter (VCSA) and using Let's Encrypt for SSL Certificates
Security Professionals: Yes we appear vulnerable but that attack vector will never happen – Russell Ballestrini
Hacker Olive Oil Lamp Crafted From Home Materials – Russell Ballestrini
A system administrators guide to installing and maintaining multiple python environments – Russell Ballestrini
Python Image Grabber pig.py – Russell Ballestrini
virt-back: restoring from backups – Russell Ballestrini
A Deep Dive into InfluxDB - via @codeship | via @codeship
Darktable for Windows using Vagrant - ZenCoffee Blog
The Life of Kenneth: Creating an Autonomous System for Fun and Profit
Seth's Blog: Five contributions
Healthcare Exchange Standards: HIE Future is bright - Automated not Manual
Understanding Guide to Nmap Firewall Scan (Part 1)
3 Pillars of Cyberthreat Intelligence
2017 Hacker Holiday Gift Guide · System Overlord
10 Best LaTeX Editors For Linux
A.J. Baime on Truman’s “Completely Different Avenue of the American Dream” » Public Libraries Online
Azure Stack Validation Environment – Part 3: Subscriptions – AzureCAT Guidance
SharePoint Performance Issue – Ahmed Amin
How to create a self-signed SAN certificate, wildcard certificate vs SAN – benjamin perkins
DevOps for Data Science – DevOps Maturity – Carpe Datum
Cloud Computing + Modern DevOps == Productivity Gains – Make it better
Azure Stack Validation Environment – Part 5: Putting it all together – AzureCAT Guidance
How we made backups faster with SQL Server 2017 – MSSQL Tiger Team
Azure Stack Validation Environment – Part 1: Overview – AzureCAT Guidance
Wednesday Featured Forums: SQL Server – Forum Ninjas
5 Lessons to Become a Really Good Self-Taught Programmer
The 50 Cool Uses for Live CDs
12 Raspberry Pi Christmas Projects You Can Make in a Day
Three things I learned at Devoxx
As I See It: The Pros and Cons of Doing Nothing - IT Jungle
Install Windows 10 on Surface 1TB with MDT | Keith's Consulting Blog
Becoming Your Own ISP, Just for Fun | Hackaday
Continuous Network Container Security for Docker Containers - NeuVector
Beautiful blue Raspberry Pi 3 goes on sale, but you (probably) can't buy it
Why you should consider applying for grad school right now - 80,000 Hours
MHA - Mail Header Analyzer - KitPloit - PenTest Tools for your Security Arsenal ☣
Four Ways to Protect Your Backups from Ransomware Attacks
Shadow IT: The Invisible Network
NBlog - the NoticeBored blog: NBlog November 14 - 50 best infosec blogs
Implementing SPF, DKIM, and DMARC – Linux Included
Testing SPF, DKIM, and DMARC – Linux Included
NHS needs to develop cyber-sec culture to reap benefits of digitisation
GitHub - vanhoefm/krackattacks-scripts
SANS Digital Forensics and Incident Response Blog | 4 Cheat Sheets for Malware Analysis | SANS Institute
Supplementing Windows Audit, Alerting, and Remediation with PowerShell
Data Mining in the Dark: Darknet Intelligence Automation
The State of Honeypots: Understanding the Use of Honey Technologies Today
Threat Predictions for Industrial Security in 2018 - Securelist
Threat Predictions for Connected Health in 2018 - Securelist
New product aims to help with GDPR's 'right to be forgotten'
GDPR guidance at your fingertips
General Data Protection Regulation (GDPR) – The Cloud Security Alliance (CSA) has prepared various tools and resources to help both enterprises and cloud service providers comply with the GDPR.
Is Google Cloud network really better than AWS network ? – Gabe's Blog
Top Takeaways From the Healthcare Security Summit
A CISO Sizes Up Healthcare Security Threats for 2018
Here's How To Get Solid Browser Security [Update 2017]
Matchup: GDPR and New Zealand's Privacy Act 1993
Analysis: How Malware Creators Use Spam Emails to Maximize Their Impact
House Committee Urges HHS Action on Medical Device Risks
Errata Security: Your Holiday Cybersecurity Guide
Wisconsin Statewide Health Information Network
Healthcare Exchange Standards: Extra software/transaction details in FHIR AuditEvent / ATNA Audit Message
How to Leverage the Rosetta Stone of Information ...
20 Years of Protecting Intermediaries: Legacy of 'Zeran' Remains a Critical Protection for Freedom of Expression Online | Electronic Frontier Foundation
Security Education Companion
New Guide for Political Campaign Cybersecurity Debuts
3 Ways to Retain Security Operations Staff
We're Still Not Ready for GDPR? What is Wrong With Us?
121 Pieces of Malware Flagged on NSA Employee's ...
Death of the Tier 1 SOC Analyst
White House Releases New Charter for Using, ...
Moving Application Authentication to the Operating System
Fred Kwong: The Psychology of Being a CISO
Insider Threats: Red Flags and Best Practices
2017 Has Broken the Record for Security Vulnerabilities
Employee training remains the best first line of defense against cybersecurity breaches | CSO Online
What is penetration testing? The basics and requirements | CSO Online
The CIO should report to the CISO | CSO Online
Ransomware damage costs predicted to hit $11.5B by 2019 | CSO Online
Hacker John Draper banned from DefCon for sexual misconduct
The cybersecurity skills shortage is an existential threat
Bay Dynamics Risk Fabric puts vulnerabilities in context | CSO Online
GDPR: How to Make it a Competitive Advantage | CSO Online
Building A Perfect Sysmon Configuration File | CQURE Academy
11 top tools to assess, implement, and maintain GDPR compliance | CSO Online
Should we wait for Oracle 19? – Upgrade your Database - NOW!
Proxy over SSH on Windows, Mac or Linux – – Unixblogger –
What’s the difference between a ‘Malicious Threat’ and a ‘Careless Insider’? - Balabit Blog
How to force Windows to start downloading the Windows 10 update files | VentureBeat
The Thanksgiving Reader by Seth Godin
7 useful bcc/BPF performance analysis tools for Linux | Opensource.com
How To Kill The Largest Process In An Unresponsive Linux System - OSTechNix
How to improve ROI on automation: 4 tips | The Enterprisers Project
How to Create Your Own NAS Storage with Openmdediavault
Boot Linux ISO From Android Phone - LinuxAndUbuntu - Linux News | Apps Reviews | Linux Tutorials HowTo
How to setup Quad9 DNS on a Linux
Raspberry Digital Signage | Binary Emotions
Banana Backups | Linux Journal
Four Hidden Costs and Risks of Sudo Can Lead to Cybersecurity Risks and Compliance Problems on Unix and Linux Servers | Linux Journal
InsecRes - A Tool to Find Insecure Resources on HTTPS Sites
How to audit NTLM? | >_
Beyond passwords: how human behavior is the next step for security - Balabit Blog
Pentagon left public intelligence gathering data on exposed server
Sending netdata metrics through syslog-ng to Elasticsearch - Balabit Blog
Top 5 Student Loan Debt Tips - Law and Daily Life
Debian and the GDPR
Cli.Fyi - Quick And Easy Way To Fetch Information About IPs, Emails, Domains And Lots More - OSTechNix
The 10 Easiest Ways to Keep Ubuntu System Clean
adcli – Easy Way To Join RHEL/CentOS System To Active Directory Domain
Sysadmin 101: Patch Management | Linux Journal
Harnessing the Power of Cloud Securely
/r/netsec's Q4 2017 Information Security Hiring Thread : netsec
Sr. Information Security Vendor Assurance Analyst at UPS • JOFDAV
CISO Manifesto: 10 Rules for Vendors | LinkedIn
Cyber-Security, the Continuous Life-Cycle (Part II) | LinkedIn
The Life-Cycle Process of a Security Gap (Part 1) | LinkedIn
A CISO's Seven Fundamentals | LinkedIn
The Strange Art of Writing App Release Notes - IEEE Spectrum
PowerShell Gallery | PSWindowsUpdate 1.6.1.1
Software Updates | Bloomberg Professional Services
A newbies guide to ELK - Part 1 - Deployment - mwpreston.net
The Best PCB Design Software For Linux - Linux notes from DarkDuck
Upgrade VMware ESX from the command line | Velenux Home Page
Terraform - vSphere - CentOS 7 Customization Issues - EverythingShouldBeVirtual
FaaS & Serverless – Vendor lock-in or not? Consider the cost of the full application lifecycle – Karim Vaes
Getting your feet wet with Docker and Containers – Low End Box
Cuckoo’s Egg – Week 1 Notes – Chris Sanders
First impressions of KeyChest – A new TLS certificate expiration tracker – Ctrl blog
Baking SSDs: The SSD oven trick - The Silicon Underground
INFOSEC NIGHT: Best Practices for Keeping Your Home Network Secure (10/12) - Unallocated Space
The 10 command(ment)s of Docker (NAV on Docker #6) – Freddys Blog
20 Sed (Stream Editor) Command Examples for Linux Users
CentOS / RHEL : How to collect sosreport
Install Debian 9 (Stretch) via PXE Network Boot Server
All you need to know about sosreport tool - Kernel Talks
How to easily merge PDF documents under Linux – – Unixblogger –
The only responsible Encryption is End-to-End Encryption -
How are teams currently using osquery? | Trail of Bits Blog
The Year of the Modern Attack Surface - Blog | Tenable™
The Future of SecOps: Behind the 8 Ball
Top 5 cybersecurity mistakes IT leaders make, and how to fix them - TechRepublic
Report: 40% of IT security leaders don't change default admin passwords - TechRepublic
Securing Open RDP Ports – Linux Included
Equifax breach gives IT $87.5 million reminders to apply critical security patches - TechRepublic
Homeland Security team remotely hacked a Boeing 757 | CSO Online
A National Cybersecurity Action Plan is a Serious Priority – The #CyberAvengers
FDA Official Dispels Medical Device Security Myths
Routing packets from a VLAN through a VPN with Ubiquity routers (Unifi Security Gateway or Edge Router Lite) | stewart a.
Michigan to implement 211 cybercrime hotline
Switzerland to become a secure haven for the world's data | Swiss Economics
Me on the Equifax Breach - Schneier on Security
NBlog - the NoticeBored blog: NBlog November 10 - one step at a time
Former CISO: Knowledge of cyber should be requirement to join board of directors
Tennessee city hit with ransomware, $250K demanded
The Private Sector's Responsibility in Preventing a Catastrophic National Cyber Attack
Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks – Windows Security blog
Is the 1.6TB Paradise Papers exposé a leak or a hack? – Naked Security
"Paradise Papers" breach reveals offshore tax secrets, U.S. commerce secretary's Russian ties
Simple exploit can be used to disable Brother printers remotely – Naked Security
Artificial Intelligence: A New Hope to Stop Multi-Stage Spear-Phishing Attacks
Beverly Hills Security Summit ~ Cyber Thoughts
Securing Health IT Value ~ Cyber Thoughts
Healthcare Exchange Standards: Healthcare use of Blockchain thru creative use of Smart-Contracts
UK Cybersecurity Center Issues 'The Dark Overlord' Alert
Notes and Analysis on the 2017 Verizon DBIR Report
Documentum xPlore: Tuning of JVM for high throughput and low CPU usage
What are shielded virtual machines and how to set them up
Convert ANSI (terminal) colours and attributes to HTML
Desktop Upgrade 2017
Exploring Big Data: Course 3 – Introduction to NoSQL Data Solutions – Sam Lester – SQL Server & BI Premier Field Engineer
DailyTech - PiJuice – The Portable Power Supply for Raspberry Pi
ZooKeeper vs. Doozer vs. Etcd | devo.ps
MINIX: the OTHER operating system in your Intel computer – Marksei
Pictures from Thursday at Devoxx
Pictures from Wednesday at Devoxx
Pictures from Tuesday at Devoxx
Pictures from Monday at Devoxx
Friday Hack Chat: Fundamentals Of RF | Hackaday
How OpenChain can transform the supply chain | Opensource.com
Why the cloud doesn't work for all businesses [Q&A]
We've reached the cloud computing tipping point
[Part 1] NAScrate - the budget for the budget NAS | Keyboard meet head
DeployHappiness | Finding Computers with a Broken Trust Relationship
Openchain - Blockchain technology for the enterprise
90 percent of IT pros worry about public cloud security
Solix launches free GDPR readiness tool
Using Plaster To Create a New PowerShell Module | SQL DBA with A Beard
Why zero knowledge may be your fast track to GDPR compliance
Siemens Teams Up with Tenable
net-automation/ansible/week2 at working · kceltyr/net-automation · GitHub
ansible-examples/LLDP-to-Graph at master · ipspace/ansible-examples · GitHub
Will GDPR Usher in Big Changes for Healthcare Security?
When Ransomware Strikes: 7 Steps You Can Take Now ...
12 famous (and infamous) IT security disasters | CSO Online
What is the cyber kill chain? Why it's not always the right approach to cyber attacks | CSO Online
The risk of okra | CSO Online
IPv6 Primer for Deployments
Battle Scars from OpenStack Deployments
Kubernetes on OpenStack: The Technical Details
Slicing Scientific Data | Linux Journal
PoE, PoE+ and Passive POE | Linux Journal
OpenStack 'Pike' Focuses on Basics Instead of Gee-Whiz New Features | IT Pro
OpenStack Pike Debuts Updated Open-Source Cloud Platform
New Features Coming in the OpenStack Pike Cloud Platform
OpenStack Growing Both Public and Private Cloud Footprint
Improve your bash/sh shell script with ShellCheck lint script analysis tool – nixCraft
How to Deploy 800 Servers in 8 Hours
Can OpenStack Beat AWS in Price
PowerShell module: Export your computer configuration - Syst & Deploy
Powershell Tool : Compare two computer configuration - New Version - Syst & Deploy
Get rid of "WARNING! Your cache is running out of filedescriptors" in Squid Proxy - LinuxTechLab
OpenStack Summit Sydney Day 1 Keynote
Wassenaar, Cybersecurity, and Why European Officials Get Better Lunches than Americans - Lawfare
Crunchyroll website hack tried to infect visitors with malware (updated)
InfoSec Handlers Diary Blog - Securing SSH Services - Go Blue Team!!
Applied Crypto Hardening
Cloud Security: Defense in Detail if Not in Depth
Seattle Woman Says Her Identity Has Been Stolen 15 Times Since Equifax Data Breach | HuffPost
CPO to CISO: Four Steps for Privacy Professionals to Get Security Savvy - CPO Magazine
The Krack Wi-fi Vulnerability Explained in Plain Terms
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Safe
Jennings Aske on Getting Serious About Medical Device Security
WiFi Exploitation with WifiPhisher
10 Scariest Ransomware Attacks of 2017
On the Luxury of Abandoning a Nice Corporate Job for the Freedom of Freelancing
AT&T Cybersecurity Report
Does understanding the cost of IT really matter? | Virtual Me
KVM - VM Templates - EverythingShouldBeVirtual
Generating/Executing Terraform Plans Using Ansible - EverythingShouldBeVirtual
Ansible - MAAS Management - EverythingShouldBeVirtual
Learn Micro Services Monitoring - Vagrant Provisioned Using Ansible - EverythingShouldBeVirtual
InfoSec Handlers Diary Blog - Auditing SSH Settings (some Blue Team, some Red Team)
5 Reasons CISOs Should Keep an Open Mind about ...
Hacking Airwaves with Fruit Part 1: WiFi Pineapple Mark IV Basics - EH-Net Online Mag
HHS continuing to push for health care cyberthreat sharing
PwC study: Many companies are not prepared to handle cyberattacks
The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security
Beginner Guide to Classic Cryptography
Building the Airplane in Mid-Flight: Bringing Cyber Security Structure to Special Operations Units
NBlog - the NoticeBored blog: NBlog November 3 - audit sampling (LONG)
Today You’re Being Hacked - How To Choose Secure Settings
Healthcare Orgs in the Crosshairs: Ransomware Takes Aim
Creating a Logging Infrastructure
Harbor™ by VMware®
OCR: Mobile Devices Still Pose Security Risk to Health Data
How to Install LineageOS on Raspberry Pi - Make Tech Easier
Easy guide to secure VNC server with TLS encryption - LinuxTechLab
How to create a Hydrogen drumkit for fun and profit | Opensource.com
OnionShare - A Tool To Share Any Size Of Files Securely And Anonymously | 2daygeek.com
SQL Updates Newsletter – October 2017 – SQL Server Updates and Lessons Learned
12 emerging IT job titles with a bright future | The Enterprisers Project
Analyzing Song Lyrics | Linux Journal
The Handbook of Japanese Beans
Changes in RHEL 7 Security Technical Implementation Guide Version 1, Release 3 - major.io
My VM is lighter (and safer) than your container | the morning paper
PASS SUMMIT 2017 - SQL Server Security - Blog dbi services
(My) CSSLP Notes – Software acceptance | Adventures in the programming jungle
wildfly | panticz.de
An Opinion in Defence of NATs
Testing the Waters: How to Perform Internal Phishing Campaigns | Linux Journal
How To Check Installed Linux Kernels - OSTechNix
Using the Correct Tool for the Job
Are you a Tool or Rain Maker? - The Matrix has you...
Hilton data breaches lead to $700,000 penalty
Cisco ASA: Prioritise RDP Traffic | PeteNetLive
Occupy the cloud: distributed computing for the 99% | the morning paper
The Four Values of a Devops Transformation | via @codeship
SQL Server on Linux on Docker quick and easy – Orrin Edenfield
Four in five companies aim to change the way they manage IT security in the next year
Blade Server Options for VMware vSAN ReadyNode » Blades Made Simple
What’s new in SSHGuard 2.1 – Ctrl blog
A Guide to Attacking Domain Trusts – harmj0y
A Masscan Tutorial and Primer
The Equifax Breach – A Cyber WTF Moment - Blog | Tenable™
5 questions to ask your CEO about cybersecurity | CSO Online
State-sponsored cyberattacks are now the preferred method of warfare | CSO Online
When Is Cybersquatting Illegal? - Law and Daily Life
NAIC Model Law passes | CSO Online
An AI detected colorectal cancer with 86 percent accuracy
http://www.itsmf.org.hk/eng/event35/Carl_COBIT_ITIL_for_Change_Mgmt.pdf
HP lost key historical archives in California's wildfires
TBS Structured Wiring Jacket Colors
Where to Put Structured Wiring Wall Jacks
RJ11 Phone to RJ45 Jack
How to Declutter Your Home Office – BizSpark Australia
Personal Countersurveillance (I): Facial Recognition - Security Art Work
How to debug Windows Crash Dump – BSOD – MILOSZENGEL.com
IT That Should Just Work: Backup and Restore ESXi Host Configuration
Melissa Hathaway on The Future of Cybersecurity - Lawfare
​How To Create An Efficient Kanban Board/Process | Purple Gr...
How to block executables from APPDATA – MILOSZENGEL.com
​VeriSM is it the future of IT Service Managemen | Purple Gr...
IT That Should Just Work: Windows Server 2016 Licensing Explained
Difference between antivirus and antimalware - The Silicon Underground
Intel NIC vs Realtek networking - The Silicon Underground
IT security hindering productivity and innovation, survey shows
Depositions Instead of Searching for Responsive Email? – Bow Tie Law
The Best Meeting Ever » Public Libraries Online
LEAP#352 Decoding ACARS – tardate 2017
The QUIC transport protocol: design and Internet-scale deployment | the morning paper
CIO Dashboard » Top 10 Metrics for a New CIO
Signature-Based Detection With YARA
Quick guide to SIAM
Managing ESXi Firewall with vSphere client, PowerCLI.
The (Amateur) Data Science Body of Knowledge – Carpe Datum
The Five Minute* Guide to Machine Learning – Carpe Datum
The Data Scientist’s Computer – Carpe Datum
Investigation: WannaCry cyber attack and the NHS
Investigation: WannaCry cyber attack and the NHS - National Audit Office (NAO)
Cisco's Talos Intelligence Group Blog: Threat Spotlight: Follow the Bad Rabbit
Lecture Notes on Cryptography
Experience SQL Server 2017: Start your journey here – SQL Server According to Bob
LogFileParser with PowerShell – PowerInTheShell
MSSQL Penetration Testing with Metasploit
Microsoft Azure Notebooks - Online Jupyter Notebooks
Why Only Use One Controller When You Can Use ALL Of Them? | Hackaday
A Short Guide to Motherboard Parts and Their Functions
How to Split a Huge CSV Excel Spreadsheet Into Separate Files
Building a Home Lab for Offensive Security & Security Research · System Overlord
Detecting Bad Rabbit Ransomware - Blog | Tenable™
Using chef, terraform and vCenter
Our 20 most popular pieces of research - 80,000 Hours
Bad vs. Less Bad Security Reporting: CoreML vs. Ships
Bad Rabbit ransomware - Securelist
Canada's 'super secret spy agency' is releasing a malware-fighting tool to the public
Announcing the vSphere 6.5 Topology and Upgrade Planning Tool - VMware vSphere Blog
Managing Cyber Security in Today’s Ever-Changing World
IOActive Labs Research: Embedding Defense in Server-side Applications
Reaper: Calm Before the IoT Security Storm? — Krebs on Security
Panama Papers-style leak may follow breach of offshore law firm Appleby
NBlog - the NoticeBored blog: NBlog October 27 - Equifax cultural issues
5 paths to a career in cybersecurity – Naked Security
Equifax Was Warned - Motherboard
Comprehensive Guide to Sniffing
The Price Of Compliance: Study Uncovers GDPR Costs 10/26/2017
Congressional Committee Wants Nuance to Share NotPetya Details
Medical Device Security: What Really Works? - HealthcareInfoSecurity
Cyber Security=Brand ProtectionWebinar. - HealthcareInfoSecurity
The Equifax Data Breach: A UK Perspective - HealthcareInfoSecurity
How a Medical Device Vulnerability Can Compromise Privacy
Why you should care about concurrency – Gabe's Blog
Download the ISMG Faces of Fraud Industry Survey
"TorWitness" Docker Container: Automated (Tor) Websites Screenshots - /dev/random
Why Patching Software Is Hard: Technical Challenges
Why Patching Software Is Hard: Organizational ...
BadRabbit ransomware attacks multiple media outlets | CSO Online
How Sutton’s Law applies to cybersecurity today | CSO Online
How much will non-compliance with GDPR cost you? | CSO Online
Measuring cyber resilience – a rising tide raises all ships | CSO Online
A Checklist for Securing the Internet of Things
3 Steps to Reduce Risk in Your Supply Chain
Navigating the General Data Protection Regulation with data maps | CSO Online
Insider threats: the 4 vulnerabilities you’re missing | CSO Online
3 Must-Haves for IoT Security: Learn, Segment & Protect | CSO Online
(My) OWASP Belgium Chapter meeting notes | Adventures in the programming jungle
(My) CSSLP Notes – Secure Software Requirements | Adventures in the programming jungle
(My) CSSLP Notes – Secure Software Design | Adventures in the programming jungle
(My) CSSLP Notes – Secure Software Implementation | Adventures in the programming jungle
(My) CSSLP Notes – Secure Software Testing | Adventures in the programming jungle
(My) BruCON 2017 Notes (2) | Adventures in the programming jungle
(My) Brucon 2017 notes (1) | Adventures in the programming jungle
Sales Tax Rates in Major Cities, Midyear 2017 - Tax Foundation
Top 5 Tips for Sales Engineers & Seeking Wisdom – Virtually Sober
For a dollar, an AI will examine your medical scan
InfluxData (InfluxDB) | Time Series Database Monitoring & Analytics
General thoughts about patching | rootpool
Empty homes | rootpool
Stricter Data Regulation Is on the Way: Are You Ready? -- Virtualization Review
Ditch Your HDDs For ACloudA Gateway - ESX Virtualization
Equifax data breach is also being investigated by UK officials
CSO Online Daily Dashboard | CSO Online
How to install and use ReaR (Migration & Recovery tool) on CentOS 7 / RHEL 7
Bad Rabbit Used Pilfered NSA Exploit
FDA Spells Out When Medical Device Modifications Need Review
Flashing TM-AC1900 to RT-AC68U ~ Bay Area Tech Pros
World's Most Common Industrial Control Protocol Dates From 1979
InfoSec Needs to Embrace New Tech Instead of Ridiculing It
Ransomware in Healthcare: Time for Vigilance - HealthcareInfoSecurity
Differences between PSU / BP and RU / RUR
How to roll your own backup solution with BorgBackup, Rclone, and Wasabi cloud storage | Opensource.com
Using Cron with EMC VNX and Celerra - THE SAN GUY
Create Network Diagram from LLDP Neighbor Information « ipSpace.net by @ioshints
A Sample Makefile for Publishing Blog Articles
Think Carefully Before Signing Up For a High Deductible Health Plan
Infrastructure Monitoring with TICK Stack - via @codeship | via @codeship
Report GPOs with Script References | Alan's Blog
An Overview of the Security Ecosystem in Programming - via @codeship | via @codeship
Desired State Configuration(DSC) for SQL Server ***Update 2 – Troy Ault's Blog
Query Store Best Practices for Mission Critical or Busy SQL Server | Vikas Rana
The new dynamics of strategy: sense-making in a complex and complicated world | the morning paper
Seth's Blog: Price vs. cost
SQL Server 2016 Express SP1 – Always Encrypted – Premier Developer
KRACK vulnerability breaks encryption over every Wi-Fi networks – Marksei
Why Setting IT Priorities Is So Important - IT Jungle
GTD Infographic
Why Hospitals Need Better Data Science
More Than Digital Dirt: Preserving Malware in Archives, Museums, and Libraries
Find native memory leaks in Java
Shrink VirtualBox VDI files with TRIM | Erik Wramner
How to create a “heatmap” graph network visualization – David Vassallo's Blog
What is an Business Continuity Plan? (BCP) | Tom Smyth's Blog
Why Outsource your Information Technology? | Tom Smyth's Blog
What is an IT Strategic Plan and what does it contain? | Tom Smyth's Blog
Responding to KRACK: What You Need To Know - Blog | Tenable™
Update to Pentest Metasploit Plugin
Sysinternals Sysmon 6.10 Tracking of Permanent WMI Events
Basics of Tracking WMI Activity
Getting Gigabit Networking on a Raspberry Pi 2, 3 and B+ | Jeff Geerling
5 steps leaders can take to improve cybersecurity in their organization - TechRepublic
Virtualization The Future: VMware Certification Tracks Defined
HIPAA Compliance: Self-Insured Company Reports Breach
How to install and use Uncomplicated Firewall in Ubuntu - TechRepublic
Meet Bill Pollock, founder of No Starch Press | Opensource.com
Install a Centralized Log Server with Rsyslog in Debian 9
How To Display Date And Time In History Command | 2daygeek.com
What Next Now the KRACK Smoke is Clearing? - MovingPackets.net
What Cybersecurity Standard Will a Judge Use in Equifax Breach Suits? - Lawfare
Cyber Operations and the Draft NDAA: Analyzing Section 1621 (and SecDef's Objections) - Lawfare
Getting started with Logstash | Opensource.com
KRACK Vulnerability: What You Need To Know | Electronic Frontier Foundation
Top 5 cybersecurity facts, figures and statistics for 2017 | CSO Online
The Costs of Failing to Maintain Important Machinery
InfoSec Handlers Diary Blog - Baselining Servers to Detect Outliers
Blood Test Results Exposed in Cloud Repository
How GDPR is impacting the way privacy is done
Privacy and security of telehealth must be addressed
Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update
Build it right with NIST’s Cybersecurity Framework | CSO Online
NICE Cybersecurity Workforce Framework | NIST
CSO Online Daily Dashboard | CSO Online
Errata Security: Some notes on the KRACK attack
RPM Post-Upgrade Scripts · Lindsay Hill
War Stories: Always Check Your Inputs · Lindsay Hill
DragonFlyBSD: DragonFly BSD
Japanese women rank the otaku obsessions they can most forgive in a partner - Japan Today
Microsoft’s internal bug database was hacked in 2013
Boost Your Business with These 10 Foods
Are your employees snooping on your corporate network?
Understanding AWS Tenancy - The IT Hollow
KRACK WPA2 Vulnerability Announced - Upgrade Now - MovingPackets.net
https://blog.scottlowe.org/2017/10/17/rock-stars-builders-janitors/
default listener port – Laurent Schneider
Don’t Worry About KRACK - Lawfare
Project Management Apprenticeships Change the Face of that Career
6 hard truths IT must learn to accept | CIO
Templates - Journals, CVs, Presentations, Reports and More - Overleaf
Some Tools of a PFE – PowerInTheShell
8 Fantastic Facilitation Playbooks for Designing Productive Nonprofit Meetings | Beth's Blog
JSON Resume
Top 20 Windows Server Security Hardening Best Practices | securitywing
OnePlus opens up about its secret data collection and promises an opt-out opportunity
Intro to Rebuild, a new and open source management framework | Opensource.com
Microsoft has contractually committed to CJIS regulations in 60% of the United States! – Azure Government Cloud
10 bad habits network administrators should avoid at all costs - TechRepublic
An Introduction to vSphere Security Hardening
My CompTIA Cloud SME experience – vMusketeers
HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework
InfoSec Handlers Diary Blog - It is a resume - Part 1
The Perfect Meeting Blueprint (Templates Included)
Global Security Intelligence Report | Microsoft
Famous malware threats: Where are they now?
3 truths for IT leaders navigating intense change | The Enterprisers Project
Reduce the max cookie lifetime from decades to days in Firefox – Ctrl blog
RIPE plays with 1.1.1.1 and 1.2.3.4 following APNIC allocation - PacketLife.net
Army Credentialing Opportunities On-Line Home
Cybersecurity Canon : Cybersecurity Canon
Moving from SSAE 16 to SSAE 18: Upcoming Changes to SOC 1 Audits
Server Room Tour • PC-Addicts
Hvper – One Page Internet
From the Canyon Edge: How many people in the world use Ubuntu? More than anyone actually knows!
What Is CamperForce? Amazon's Nomadic Retiree Army | WIRED
Major cyber-attack will happen soon, warns UK's security boss | Technology | The Guardian
Cipherli.st - Strong Ciphers for Apache, nginx and Lighttpd
SC's Dependency Problems | Management & Mobility content from Windows IT Pro
User Behavior Analytics | Bottomline Technologies
Add SSL certificate for RDP sessions — Mapledyne Ideas
blog.kristinlgriffin.com: Minimum Certificate Requirements for Typical RDS implementation
SAN Certificates: Subject Alternative Name – Multi-Domain (SAN)
GitHub - iadgov/Secure-Host-Baseline: Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. iadgov
GitHub - EnclaveConsulting/SANS-SEC505: Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505
Removing Self-Signed RDP Certificates | Ask Premier Field Engineering (PFE) Platforms
Getting In-Control - Combining CobiT® and ITIL® for IT Governance and Process Excellence
ILSpy is the open-source .NET assembly browser and decompiler.
What is the AllJoyn Router Service on Windows 10? - 404 Tech Support
BadNets: Identifying vulnerabilities in the machine learning model supply chain | the morning paper
Windows Server 2012 R2 stuck in reboot cycle due to failed updates - Oliver MarshallOliver Marshall
Getting to grips with NFSv4.1 and Kerberos - CormacHogan.com
How to disable a Wi-Fi card from the command line - Oliver MarshallOliver Marshall
How to install OpenVAS 9 on Ubuntu 16 LTS - Oliver MarshallOliver Marshall
How to easily update your VMware Hypervisor from 6.5.x to 6.5 Update 1 Express Patch 04 (ESXi 6.5U1EP04)
Checking you are up to date with PowerCLI - Virtu-Al.Net
6 Steps to Finding Honey in the OWASP - Dark Reading
10 Major Cloud Storage Security Slip-Ups (So Far) ...
Docker compose: what is it? How can you use it? – Marksei
Listen Notes: Best podcast search engine & podcast database
Do You Really Need Long-Term-Disability Insurance? : Shots - Health News : NPR
Equifax Hack Brings Renewed Attention To The Credit Reporting Industry : NPR
Ben's Laptop Buying Guide | b3n.org
Download Assistant for RUs, RURs, BPs, PSUs, Patch Sets and Releases
Barking Up The Wrong Tree: The Benefits of Being Mostly Optimistic
Digital Identity Guidelines Authentication and Lifecycle Management
Surviving Fileless Malware: What You Need to Know about Understanding Threat Diversification
Why Cloud Security Is a Shared Responsibility
IRS suspends Equifax contract
Equifax, TransUnion Websites Served Up Adware, Malware
Equifax breach included 10 million US driving licenses
RTV (Reddit Terminal Viewer) – A Simple Terminal Viewer For Reddit
Orgs must demand cyber accountability, Pace University CyberStorm
Former Congressional IT pro Awan wiped phone before FBI arrest
Leveraging the Multi-Stakeholder Nature of Cyber Security
Users aren't the weakest link in cybersecurity: 3 tips for IT leaders - TechRepublic
CoreOS Controls Multi-Cloud Container Environments via Tectonic 1.7
Turn Your Ansible Playbook into a Bash Command « ipSpace.net by @ioshints
Musing: Network Fabrics Of History — EtherealMind
More Accurate IT Acronyms | The Networking Nerd
Post Exploitation in VMware Files with Meterpreter
MS-SQL Penetration Testing lab Setup
Bill Proposes Medical Device Cyber Framework, Guidelines
Redefining the Role of HHS CISO - HealthcareInfoSecurity
GDPR and the Regulatory Impact on Vendor Risk
Equifax Hackers Stole Info on 693,665 UK Residents — Krebs on Security
Equifax Credit Assistance Site Served Spyware
Cyber Security in the Workplace Is Everyone’s Obligation
How to Comply With New York's Cybersecurity Regulation
How to set up a Postgres database on a Raspberry Pi | Opensource.com
How to Make Windows Better? Make It Chocolatey! | Linux Journal
10 layers of Linux container security | Opensource.com
The Top 10 Factors that Influence Your Salary - Datamation
Big bank finds open source pays off
Options to check and alert the vcenter certificate expiration | Techbrainblog
Desired State Configuration(DSC) for SQL Server ***Update – Troy Ault's Blog
Cyber attacks are as serious as terrorism, says UK's GCHQ
Google Video Quality Report
INFOSEC NIGHT: Best Practices for Keeping Your Home Network Secure (11/12) | Unallocated Space
Foreman and Puppet 5 – the Hard Way – Thin Light
Resetting vSphere 6.x ESXi Account Lockouts via SSH – DiscoPosse.com
5 Awesome Tips to Troubleshoot vMotion
PowerCLI: List all Windows VMs and OS Versions – nerdybynature
Happy Ada Lovelace Day! | Hackaday
Log Management: Graylog Vs ELK – JetRuby – Medium
PowerShell Switch type never $null | Keith's Consulting Blog
Netstat, SS and RHEL 7 / CentOS - NixPal | Server Administration & Outsourcing Solutions, Database Server. Email Server Management
Performance Regression Analysis with Performance Co-Pilot [video] - RHD Blog
Exploratory Performance Analysis with Performance Co-Pilot
What are the costs of data outages, downtime in healthcare?
Project management: A surefire way to kill your software product | TechBeacon
FTC Releases Alerts on Protecting Against Identity Theft
S.E.C. Says It Was a Victim of Computer Hacking Last Year - The New York Times
5 NFC Security Issues to Consider Before Your Next Contactless Payment
5 big challenges facing CIOs and IT leaders in 2015 (part 1) - mrc's Cup of Joe Blog
Top 10 concerns for CTOs, CIOs and IT leaders in 2017 | HPE
Building a Security Operations Center (SOC)
Disable Certain Package Updates using YUM in RHEL / CentOS / Fedora
vOneCloud: The Open Replacement for vCloud
Operating system market share
cobbler/quickstart-guide.rst at master · cobbler/cobbler · GitHub
Getting Started with Cobbler – Thin Light
Jan-Piet Mens :: Configuration management with Ansible
Clickable HTML network diagrams with draw.io | The Packetologist
Microburst: Update on the HTML Home Network Diagram - MovingPackets.net
Introduction to Cloud Computing - Router Freak
Lab Setup for VOIP Penetration Testing
BruCON Network 0x09 Wrap-Up - /dev/random
How to make your cybersecurity resume stand out: 5 tips - TechRepublic
The Reason Business Doesn't Take InfoSec Seriously
Preparing for GDPR compliance: Where you need to be now and how to get there | CSO Online
5 Big Challenges Facing CIOs and IT Leaders in 2017 | TayganPoint Consulting Group
The 3 Most Frustrating Challenges IT Security Teams Face
Verizon Wireless Internal Credentials, Infrastructure Details Exposed in Amazon S3 Bucket | Threatpost | The first stop for security news
CalCom Software- Server hardening and compliance automation
Packer - Easily build machines images for multiple platforms with the same configuration
StratusLab :: Example CentOS Kickstart File
What can I use for fully automatic VM creation/deployment? : linuxadmin
HL7 Data Interfaces in Medical Environments
HL7 Data Interfaces in Medical Environments: Attacking and Defending the Achille's Heel of Healthcare
HL7 Data Interfaces in Medical Environments: Understanding the Fundamental Flaw in Healthcare
Create Trusted Remote Desktop Services (RDP) SSL Certificate - Derek Seaman's Blog
Equifax CEO out after massive data breach - Business Insider
The Grey Corner: List comprehension one liners to extract info from nmap scans using Python and libnmap
Set advanced settings on all VMs in a cluster – Noam's scripting blog
PowerShell overview and introduction | DiabloHorn
DOTmed.com - Making the business case for compliance
Healthcare Exchange Standards: IHE IT Infrastructure Technical Framework Supplements and Technical Framework Volumes Published.
How to create a CentOS 7 KVM image with Packer | Velenux Home Page
The age of temping: Staffing employment explodes in the Upstate
GitHub - OSSIndex/DevAudit: Open-source, cross-platform, multi-purpose security auditing tool
PowerCLI: One-Liner to get VMs, Clusters, ESX Hosts and Datastores | ICT-Freak.nl
GitHub - cobbler/koan: koan - kickstart over a network
How We Use AWS, Ansible, and Packer to Make Deployment Awesome | Branch Blog
Immutable Deployments and Packer
Continuous Deployment of Golden Images with Packer and Semaphore - Semaphore
Modelio Open Source - UML and BPMN free modeling tool
New Email Security Guidelines to Combat Phishing Threats
HCIBench
Equifax Breach Fallout: Your Salary History
AutoUpdate on OpenWRT based box (also works on LEDE) · StevenBlack/hosts Wiki · GitHub
Autonomous Database - Blog dbi services
LEDE/OpenWRT — Multiple SSIDs – LEDE/OpenWrt & IoT – Medium
LEDE/OpenWRT — How to enable Client Isolation
How to upgrade TP-WDR3600 from OpenWRT to LEDE | Tech Tutorials
Quick Reference : IIS Application Pool – Rohith's blog
Understanding Guide to ICMP Protocol with Wireshark
Death of the Life Long Job | People Centre
7 deadly sins of documentation | Opensource.com
Ransomware Attack Cuts Access to X-Rays at Surgery Center
Traceroute Lies! A Typical Misinterpretation Of Output - MovingPackets.net
101 Free VMware Tools
Engaging Patrons with Library Podcasts » Public Libraries Online
A century of science: globalization of scientific collaborations, citations, and innovations | the morning paper
How hard is Security+? - The Silicon Underground
Our computers are fundamentally insecure. Here's why that could lead to global catastrophe. - 80,000 Hours
Equifax was aware of vulnerabilities prior to data breach
Zero Day Initiative — VMware Escapology – How to Houdini the Hypervisor
Introducing nzyme: WiFi monitoring, intrusion detection and forensics
HHS’s New 5-Year Strategic Plan Includes Cyber Goals
8 Tough Questions Every CISO Should Be Ready to Answer
Ransomware Will Target Backups: 4 Ways to Protect ...
Adopting minimalism in your docs | Opensource.com
Save time with Ansible without writing a line of code | Opensource.com
Security Tools (Top 100) - Linux Security Expert
Security Architecture Blueprint
CySAFE for business
ISO/IEC 15504 - Wikipedia
ISO/IEC 21827:2008 - Information technology -- Security techniques -- Systems Security Engineering -- Capability Maturity Model® (SSE-CMM®)
Open Source in the Customer Portal - Red Hat Customer Portal
Check MK – Write your own check – steinkogler.org
CMMI® for Development
Equifax Amassed Salary Details for People at 7,100 Companies - Bloomberg
Using Clover UEFI boot with Sierra on Proxmox – Nicholas Sherlock
The difference between containers and virtual machines | HPE
Configuring the Free CCNA Workbook GNS3 Topology | Free CCNA Workbook
GitHub - symfony/symfony-installer: The Symfony Installer
GitHub - Brockway/ESA-Process-Maturity: Tools to measure the maturity of Enterprise Security Architecture processes
GitHub - OWASP/ASVS: Application Security Verification Standard
GitHub - episki/episki
Capability Maturity Model Integration (CMMI) Version 1.2 Overview
Top 10 Common Misconceptions About Application Whitelisting
Powercli VM hardening script
Quick Tip – Using the CLI to upgrade to a specific VM virtual hardware version in vSphere 5.5 | virtuallyGhetto
Script: PowerCLI: Upgrade VMs to New Tools and Hardware Level Version [SHIFT]
PowerShell script for ESXi hardening – vrealize
@ISACA Volume 20 | 4 October 2017
Arkangel | MSS Platform | Hitachi Systems Security
Setting up Packer, ovftool and Apache web server on a CentOS virtual machine · sdorsett.github.io
Minimal Linux with Packer and Vagrant - Research-IT
document classes - Preparing cheat sheets - TeX - LaTeX Stack Exchange
How to make cheat sheets in Latex? - Stack Overflow
GitHub - docker/packer-centos-7: Packaging instructions for VM appliances
Creating an automated CentOS 7 Install via Kickstart file
DSHR's Blog: Not Whether But When
Cyber risks are being created by departments outside IT
PowerShell Cheat Sheet
WaaS – Official Rings and asking for Feedback – PowerInTheShell
Little’s Law and How It Impacts Load Testers  – Chris’s Performance Testing Blog
Are Websites Using Your CPU for Cryptocurrency Mining?
DSHR's Blog: OAIS & Distributed Digital Presevation
uchida/packer-centos packer template to build centos by @uchida - Repository | DevHub.io
World’s Largest Telescope Stopped by LED | Hackaday
Fraudsters Exploited Lax Security at Equifax’s TALX Payroll Division
Haunted By Data
EPIC - EPIC Urges Congress To Hold Equifax Accountable, Update Data Protection Law
Auditing Databases with Nessus - Blog | Tenable™
Experian Site Can Give Anyone Your Credit Freeze PIN – InfoSecHotSpot
New Oracle Security book - Oracle Incident Response and Forensics
Equifax data breach may be state-sponsored
3 billion Yahoo accounts affected by 2013 breach – Naked Security
SQL Server 2017 RTM is available!
ODA X7 - Blog dbi services
Oracle 18c RU and RUR for pioneers and followers - Blog dbi services
Premium Bare Metal Servers and Cloud Hosting - Packet
SAP Backs Kubernetes, Boasts Commitment to Open Source | Data Center Knowledge
How Oracle Is Moving to Kubernetes and Cloud Native Computing
How to kill your network with Ansible
Three Advances Make Magnetic Tape More Than a Memory - IEEE Spectrum
IRS hands fraud prevention contract to Equifax despite massive hack
Former Equifax CEO blames breach on one IT employee
9 Signs Your Identity Was Stolen
VMware support log size issue and workaround (VCSA ). | Techbrainblog
Powercli script to validate the basic vSphere Hardening | Techbrainblog
Ben's Law | The Cost of Being Interrupted | b3n.org
GDPR is a set of security best practices, not a burden
How to properly implement identity and access management
Interesting List of Windows Processes Killed by Malicious Software - /dev/random
[SANS ISC] The easy way to analyze huge amounts of PCAP data - /dev/random
Rice Straw Animal Sculptures from the 2017 Wara Art Festival | Spoon & Tamago
Google Vizier: A service for black-box optimization | the morning paper
How to troubleshoot slow performance after moving to azure due to network latency – Azure SQL Database Support
Roslyn Primer – Part I: Anatomy of a Compiler | The Visual Basic Team
Appendix F - Personal observations on the reliability of the Shuttle by R. P. Feynman
For everyone to benefit from technology, we need to ensure the free flow of information - Microsoft on the Issues
Vermont attorney general fines company $264K for exposure of Social Security numbers
WannaCry and NotPetya: Who, what, when and WHY?
63% of SMBs increased security spending, but more than half still experienced breaches - TechRepublic
66% of SMBs would shut down or close if they experienced a data breach - TechRepublic
The hacker playbook: How to think and act like a cybercriminal to reduce risk (notes from Microsoft Ignite 2017) | CQURE Academy
Are Data Center REITs a Good Investment? -- The Motley Fool
Why auditing your documentation is a must | Opensource.com
Aaron Toponce : 1,000 Books Read In One Year? No, Not By A Long Shot
Google Online Security Blog: Behind the Masq: Yet more DNS, and DHCP, vulnerabilities
[SANS ISC] Investigating Security Incidents with Passive DNS - /dev/random
Ousted Equifax CEO Faces 3 Congressional Hearings
Incident Response Insights from US Army Medicine CISO
8 Electrical Blackout Essentials Every Home Needs
Legislature to beef up computer security – Hudson Valley 360 – InfoSecHotSpot
Equifax breach shows signs of a possible state-sponsored hack
The Cyberlaw Podcast: Equifax and the Upside of Nation-State Cyberattacks - Lawfare
7 Ways Exercising Can Help You Succeed as an Entrepreneur
How to Use the ZFS Filesystem on Ubuntu Linux - Make Tech Easier
Using a 40Gb to 10Gb Breakout Cable on NX-OS - Mostly NetworksMostly Networks
HP Enterprise let Russia review the Pentagon's security software
Equifax will warn 2.5 million additional hacking victims by mail
PipeWire - Improved Audio & Video Handling on Linux
Smart tattoos turn your skin into a health tracker
GNS3 Labs for CCNA: Getting Started with GNS3 - Intense School
CCNA-Security Study Blog » GNS3 Lab
Our journey with devices.. what will the future bring us, what will our workplace be? -
CCNA Training » CCNA FAQs & Tips
Free CCNA Workbook | CCNA Labs, Practice Exams and More!
GNS3 network simulator for CCNA - Router Freak
.patch_storage » Peasland Database Blog
Apple: don't use Face ID on an iPhone X if you're under 13 or have a twin | Technology | The Guardian
Proxmox Import/Export OVA | Nbctcp's Weblog
Upgrade ESXi 6.0 to 6.5 | Nbctcp's Weblog
GitHub - future-architect/vuls: Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
rapid7/ metasploitable3 - a VM for metasploit. - Proturk Security Blog
How to Configure HSRP on a Cisco Router (with GSN3 lab) - Router Freak
CCNA Training » Practice CCNA GNS3 Labs
GitHub - chafey/orthanc-vagrant: Vagrant VM configuration for the Orthanc DICOM server
GitHub - chafey/dicomWeb: Information about DICOMWeb - API's, implementations, etc
Script Modify VM Advanced Setting using PowerCli
Data Breach Statistics by Year, Industry, More - Breach Level Index
EPIC - Electronic Privacy Information Center
Napalm Network Automation
How to Buy a Used Linux Container - Crunch Tools
ckan – The open source data portal software
Activiti BPM Software Home
EMR Integration for Medical Devices: The Basics (UPDATED) | Medical Connectivity
Security/Guidelines/OpenSSH - MozillaWiki
Hardening ssh Servers
Privileged Access Workstations | Microsoft Docs
OpenSSH — Harden the World 0.1 documentation
Security & Privacy Risk Assessment | Online Trust Alliance
Guide to better SSH-Security - Cisco Support Community
Linux and Unix cheatsheet: Remove weak ciphers from SSH Server
Sameh Attia: Cipher Security: How to harden TLS and SSH
What Are Application Containers And How Do I Secure Them?
Complexity kills marketing and sales. Keep it simple! - Proven Website Tips and Lifehacks
ssh - OpenSSH default/preferred ciphers, hash, etc for SSH2 - Information Security Stack Exchange
Bad SSH2 cipher spec error - comp.security.ssh
ssh2-enum-algos
sshscan
Cipher Scanner for SSH download | SourceForge.net
ScanSSH - Scanning the Internet for SSH Servers
Hunting Pastebin with PasteHunter | Tech Anarchy
Subnet Cheat Sheet | UITS Linux Team
GitHub - arthepsy/ssh-audit: SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
cmdref.net - Command Reference [cmdref.net - Command Reference]
Testing Cumulus Linux with Serverspec - Cumulus Networks Blog
Installing Check_MK agent on Windows host remotely | geekdudes
DB-Engines Ranking - popularity ranking of database management systems
The Economy: Contents
OpenVAS
Handy Tool for Converting KVM / VMware Images to Hyper-V | Ben Armstrong’s Virtualization Blog
Building a Raspberry-Pi Stratum-1 NTP Server
GitHub - dev-sec/chef-ssh-hardening: This chef cookbook provides secure ssh-client and ssh-server configurations.
NESTED VIRTUALIZATION | virtuallyGhetto
Nested Virtualization - Proxmox VE
PageSpeed Examples Directory
Nested KVM in VMware ESXi |
Performance Cheat Sheet
Basics of IPv6 Addressing « ipSpace.net by @ioshints
Monitoring Using Prometheus — Rahul Sinha
GitHub - p0bailey/packer-templates: AWS and Virtuabox packer templates for CentOS(6.8-6.9-7.3) Ubuntu(14.04-16.04) Debian(8)
Error #1009 vSphere Web Client - David Hill
Network Documentation Tool - IT Infrastructure Inventory Software
A Useful PowerShell Script to Document Your Active Directory Environment
Configuration Management with Windows PowerShell Desired State Configuration (DSC)
Scripts for Automatic System Administration
What should I ask a candidate for sysadmin role in the interview? : sysadmin
Configuration Files - a pattern for windows batch scripts – tardate 2017
A Comparison of Linux Container Images - Crunch Tools
Container Health Index grades as used inside the Red Hat Container Catalog - Red Hat Customer Portal
osTicket :: Support Ticket System | osTicket
ckan – The open source data portal software
HIPAA Privacy and Security Assessment Compliance Services Checklist
Building a Homelab VM Server - Silly Bits
GitHub - INSANEWORKS/centos-packer: CentOS 6 / 7 x64 + VirtualBox / VMWare for Packer Template
The evolution of continuous experimentation in software product development | the morning paper
Maximize productivity with a large UHD 4K display (40” or more) – Premier Developer
Calculus in 20 Minutes | Hackaday
Which disk controller to use for vSAN - Yellow Bricks
PIN code is a much safer way for you to lock your Android device
FTP Pivoting through RDP
Vendor’s Ex-Employee Allegedly Shut Down Medicaid System
How Health Entities Can Tap DHS Tools for Cyber Skill-Building
Report: Equifax Subpoenaed by New York State Regulator
Filling your data lake with log messages: the syslog-ng Hadoop (HDFS) destination - Balabit Blog
CISOs Offer Soup-to-Nuts C-Suite Strategy
Equihax: Identifying & Wrangling Vulnerabilities
Here’s What to Ask the Former Equifax CEO
Cybersecurity Insurance | Homeland Security
Equifax mea-culpas with free credit “locks” forever – Naked Security
Ignorance of Cyber Vulnerability Is No Excuse | CSO Online
In Equifax Data Breach, Three Hard Lessons in Risk | CSO Online
Practical Advice on Identity Theft and Removing Unauthorized Accounts — My Money Blog
Identity Theft, Credit Reports, and You | Kalzumeus Software
3 Python web scrapers and crawlers | Opensource.com
Announcing the dbi OpenDB Appliance - Blog dbi services
Why going to gym multiple times a week is actually a bad thing? - Proven Website Tips and Lifehacks
The Equifax Breach: Getting From Talk to Organized Response - Lawfare
7 Fun Podcasts for Kids (That Parents Love, Too)
Packet radio lives on through open source software | Opensource.com
You Need Configuration Management. Really. (Thwack) - MovingPackets.net
Collect SSH Keys with Ansible « ipSpace.net by @ioshints
WannaCry ransomware explained: What it is, how it infects, and who was responsible | CSO Online
CBS's Showtime sites silently used Monero Miners on user's browsers
Exploring the Air Gap Myth
Equifax CEO retires
Do's and Don'ts of Securing a Domain Name
Bitdefender Ransomware Recognition Tool – Bitdefender Labs
San Francisco sues Equifax over poor cybersecurity practices
Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards
Fast Food Chain Sonic Drive-In Investigating Possible Card Breach
EHR Certification Changes: Risks for Healthcare Providers
Google Online Security Blog: Broadening HSTS to secure more of the Web
Do CISOs Need to 'Dumb Down' Cybersecurity for Boards?
Trojanized CCleaner Investigation: Lucky Break
vRealize Operation 6.6 “hidden” enhancement | KISSTIBOR.info
10 Ways to Troubleshoot Poor VM Performance
How to get started with Network Virtualisation and NSX
Vanguard Thoughts: Pros and Cons from a 15-Year Client-Owner — My Money Blog
15 Veggie Noodle Dishes That Will Make You Forget About Pasta
Security Tools to Check for Viruses and Malware on Linux | Linux.com | The source for Linux information
SEC Chair Wants More Cyber Risk Disclosure From Public Firms
Is a 15-Year Mortgage a Good Idea?
Errata Security: 5 years with home NAS/RAID
Will the Equifax Data Breach Finally Spur the Courts (and Lawmakers) to Recognize Data Harms? | Electronic Frontier Foundation
FBI's Freese Shares Risk Management Tips
How to Install Ubuntu via PXE Server Using Local DVD Sources
Being Compliant is Not Being Secure - Your Business is Still at Risk!Webinar.
21 ss Command Examples In Linux
The Importance of HTTP Strict Transport Security (HSTS) - RootUsers
Configure Firewall Rules for Multiple Profiles Using Group Policy - RootUsers
8 digital skills we must teach our children | World Economic Forum
What made Porting Microsoft SQL Server to Linux to be the right move after all – Slava Oks's WebLog
How to reset IE11 to default configuration via a script? – We know IE!
An Introduction to Solid State Relays | Hackaday
Peter Block on small group working (Gurteen Knowledge)
Building a 12V 110Ah battery bank using 80 32650 LiFePO4 cells « Dangerous Prototypes
Kitchen Soap – Invited article in IEEE Software – Technical Debt: Challenges and Perspectives
Welcome to the Sapiezoic – Jon Udell
The Electronics Markets of Ho Chi Minh City, Vietnam | Hackaday
Cuban Embassy Attacks and The Microwave Auditory Effect | Hackaday
Cybercrime is costing each business a whopping $11.7M a year, report says - TechRepublic
Cyber Security and Data Integrity Problems Within the GAMP 5 Validation Process
Equifax Data Breach Prompts Calls For Tougher ...
How I come up with topics for my blog posts - SharePoint Maven
Gluster » Storage can make your digital transformation—or break it
Organizations unprepared for the ransomware onslaught
Ransomware attacks affect five percent of SMBs
Healthcare sector accounts for most cyber security incidents
NBlog - the NoticeBored blog: NBlog September 24 - five-step bulletproofing?
Redboot malware leaves researchers wondering if its a ransomware or wiper
Deloitte Breach Affected All Company Email, Admin Accounts
Time to Embrace a Security Management Plane in the Cloud | CSO Online
Who decides when you need to update vulnerable software? (Equifax)
How to Install and Configure Jenkins Server on CentOS 7 to Automate Your WordPress Tasks
How to find disk I/O latency with ioping monitoring tool on Linux – nixCraft
Maximizing IT’s Impact with Microsoft 365 Powered Devices – Enterprise Mobility and Security Blog
Am I a DBA 3.0 or just an SQL*DBA? - Blog dbi services
23 Hardening Tips to Secure your Linux Server
Golden walk - Japan Today
Celebrating the completion of the most advanced subsea cable across the Atlantic - The Official Microsoft Blog
GitHub - jturgasen/my-links: A collection of OSS tools and handy links
GitHub - rshipp/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources
AUTOMATED SECURITY HARDENING OF RED HAT ENTERPRISE LINUX V5 IN ACCORDANCE WITH DISA STANDARDS
Security Compliance Manager (SCM)
Top 10 Security Hardening Settings for Windows Servers and Active Directory
NIST Cybersecurity Framework Impacting Your Company?
Wekan — open-source kanban
Welcome to COSO
Updated COSO framework will help audit committees comply with SOX
Defining a Baseline for Improvement | BPMInstitute.org
Apache jclouds® :: Home
COSO Framework 2013 & SOX Compliance
SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners
SAS 70, SSAE 16, SOC and Data Center Standards | Data Center Knowledge
SOC 1 & SOC 2 Preparation Checklist | The SSAE 18 Reporting Standard - SOC 1 - SOC 2 - SOC 3
The Cyborg Institute — Cyborg Institute
HIPPA PCI-DSS Policy Mapping Table
Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards
Meeting Compliance Efforts with the Mother of All Control Lists (MOACL)
Sarbanes-Oxley Information Technology Compliance Audit
CIS Controls
Hitask - Easy Project and Task Management for Teams
check_mk/cisco_checkconfigsecurity at master · reca/check_mk · GitHub
Cyberstates 2017
2017 IT Industry Job Market & Salary Trends Analysis | Cyberstates by CompTIA
17 pen testing tools the pros use | CSO Online
HP unveils its insanely upgradeable Z-class workstations
Exxact Corporation
Using GPUs in KVM Virtual Machines
Secure Deployment Guide for NetScaler MPX, VPX, and SDX Appliances
The NeXT Years: Steve Jobs before His Triumphant Return to Apple | Low End Mac
Cybersecurity Firms Underwhelm Despite Increased Investor Interest
Why Equifax’s error wasn’t hiring someone with a music degree
Learn Linux System Auditing with Auditd Tool on CentOS/RHEL
How To Use Ping, fping, and Gping For Varies Purpose In Linux | 2daygeek: Linux Howtos, Tutorials, Guides, Linux Tips & Tricks
How to Query Audit Logs Using 'ausearch' Tool on CentOS/RHEL
Equifax has been sending customers to a fake phishing site for weeks – Naked Security
OSSIM: CIS Critical Security Controls Assessment in a Windows Environment.
Cheat sheet: How to become a cybersecurity pro - TechRepublic
Health IT & Cybersecurity: 5 Hiring Misconceptions ...
Equifax Data Breach: The Essential Protection Guide to Secure Your Data
Powershell Functions for tags | Virtual Me
832 TB – ZFS on Linux – Configuring Storage: Part 3 | JonKensy.com
832 TB – ZFS on Linux – Setting Up Ubuntu: Part 2 | JonKensy.com
832 TB – ZFS on Linux – Project “Cheap and Deep”: Part 1 | JonKensy.com
Calibrate Your Monitor - The Lone Sysadmin
Linked - Tesla Remotely Extended The Range Of Drivers In Florida For Free... And That's NOT A Good Thing
Veritas can reach APAC customers via GDPR | ZDNet
Equifax Breach: Setting the Record Straight — Krebs on Security
How BitPaymer ransomware covers its tracks – Naked Security
Equifax hackers likely in network since March
Hackers hold entire school district to ransom – Naked Security
After massive data breach, Equifax sent victims to fake phishing site for support - TechRepublic
Equifax breach has some calling for a credit reporting industry 'rethink'
A look at how this small business is preparing for the GDPR
SEC Says Intruders May Have Accessed Insider Data ...
Equifax's May Mega-Breach Might Trace to March Hack
Canada’s Tough New Breach Reporting Regulations
SMBs Paid $301 Million to Ransomware Attackers
IDM OIM Blog: How to setup mrepo Redhat 7
How To Find Vulnerable Packages In Arch Linux - OSTechNix
What is Kubernetes? – Marksei
Cloud Design Patterns – Availability – Premier Developer
Health Insurance Premiums: Average Annual Cost $19,000 Family, $6,000 Individual — My Money Blog
FedEx estimates ransomware attack cost $300 million
Experian makes it easy for someone to undo your credit freeze
Equifax Confirms Another 'Security Incident' : The Two-Way : NPR
Following Equifax, Focus On Database Encryption - IT Jungle
Need a Night-Light? | Hackaday
The practical guide to fighting ransomware
New security platform uses live attacks to evaluate risk
Is DevOps the Best Thing to Ever Happen to Security? - Blog | Tenable™
8 best practices for managing software patches - TechRepublic
5 tips for enterprises to ensure their SMB partners don't cause a data breach - TechRepublic
A Modern Hypervisor as a Basis for a Sandbox - Securelist
Hardening Apache Struts with SELinux – DoublePulsar
PCI's Data Security Standards at a Glance
WannaCry and Hollywood hospital ransomware attacks crossed a line for some cybercriminals
Report: Negligent employees are no. 1 cause of cybersecurity breaches at SMBs - TechRepublic
Understand the dangers of OSS? Equifax means you have to
Equifax names interim CSO, CIO;
Heads roll, as it's revealed Equifax's IT team knew about web app vulnerability
Equifax Disputes Report of Undisclosed Breach From March
Security Alert: Cyber Criminals Slip Backdoor in CCleaner to Potentially Spread Malware
An intro to machine learning | Opensource.com
How to use Let's Encrypt to secure your websites | ZDNet
Why Adding Technical Experts to Boards Is Urgent
sysbench Histograms: A Helpful Feature Often Overlooked - Percona Database Performance Blog
Medical Supply Firm Hacked; Log Review Key to Detection
HHS Incident Response Will Be Scrutinized - HealthcareInfoSecurity
The 6 phases of adopting cloud security practices | CSO Online
Siemens' New ICS/SCADA Security Service a Sign of ...
Oracle 12.2 underscores appear in SPFILE - be aware when you flashback
Sizing Windows 2016, Windows 2012 and Windows 10 Virtual Machines | Ask the Architect
Upgrading Debian 8 to version 9 - Fun with virtualizationFun with virtualization
Oracle 12.2 Adaptive Features are enabled in Oracle 12.1.0.2 Windows BPs
Netool.io – A simple to use passive network port analyzer that gives you the information you need.
CentOS 7 Server Hardening Guide | Lisenet.com :: Linux | Security | Networking
On the Beauty of Python's ExitStack — Nikolaus Rath's Website
SSD Caching under Linux — Nikolaus Rath's Website
DSHR's Blog: Attacking (Users Of) The Wayback Machine
The Science Behind Lithium Cell Characteristics and Safety | Hackaday
10 Things You Always Wanted to Know About Arduino
Partner Post: Monitoring of BizTalk Server using BizTalk360 – BizTalk Team Blog
7 More Lesser-known Debugging Tactics for Visual Studio | The Visual Studio Blog
Getting Started in Offensive Security · System Overlord
Whose Fault Is It? (A brief discussion on misconceptions about Equifax) | tisiphone.net
Equifax Hit with Lawsuit
Isilon Tech Refresh - Replacing old NL400 Isilon nodes for NL410's - FastStorage
Equifax Exec Departures Raise Questions About ...
How to implement SharePoint in 5 meetings - SharePoint Maven
7 tips for Linux cluster admins to help keep auditors happy
How to avoid a GDPR compliance audit: Best practices | The Enterprisers Project
Download / use Oracle Database Security Assessment Tool DBSAT
Active Directory Access Control List – Attacks and Defense – Enterprise Mobility and Security Blog
Public cloud has forced change | Virtual Me
After Equifax Hack, Consumers Are On Their Own. Here Are 6 Tips To Protect Your Data : NPR
Equifax stock sales prompt DOJ investigation for insider trading
Equihax: One of the Most Calamitous Breaches of All Time
Equifax data breach: Time to do a 15 minute cybersecurity makeover
ROCK NSM
VMware vSphere and ESXi - Create a 'Logon Banner' | PeteNetLive
Backup and Restore of VCSA 6.5
Integrate new firewalls into Panorama via CLI | sitweak
IOIOBox
Equifax confirms up to 400,000 UK consumers at risk after data breach
Three CIO survival lessons: 'Step up or step aside'
Equifax releases details on cybersecurity breach
AdoptOpenJDK - Open source, prebuilt OpenJDK binaries
7 Cybersecurity Questions Every Leader Should Ask
Update CustomSettings.ini file remotely! | Keith's Consulting Blog
Getting started with Docbook | Opensource.com
Does Equifax Owe Victims a Duty of Care? - Lawfare
Security Communication | Washington | Clear Security Communication
On the Equifax Data Breach - Schneier on Security
What's the Difference Between Zigbee and Z-Wave? Here's Everything You Need to Know
Why the Equifax breach could force executives to finally take cybersecurity seriously - TechRepublic
Connected Medicine and Its Diagnosis - Securelist
InfoSec Handlers Diary Blog - Analyzing JPEG files
Security Communication | Washington | Clear Security Communication
Security Communication | Washington | Clear Security Communication
NBlog - the NoticeBored blog: NBlog September 13 - surveying the corporate security culture
Security Tools for the SMB and SME Segments
Equifax felled by a months-old Apache Struts vulnerability – Naked Security
BlueBorne - the Attack that Can Spread Malware without an Internet Connection
Schumer calls for resignations unless Equifax offers better identity theft protections
European Commission plans cybersecurity overhaul, giving ENISA more power
FTC announces investigation into Equifax data breach
Equifax Hackers Stole 200k Credit Card Accounts in One Fell Swoop — Krebs on Security
Gauging Equifax's Future in Wake of Massive Breach
Top Democrat Likens Equifax to Enron as FTC Launches Probe
CDDC: One Secure Screen for Classified, Secret and Public Networks
RDP Pivoting with Metasploit
Bill creating an Office of Cyber Issues in the State Department proposed
Senate bill calls for free credit freezes after Equifax breach
Open Source Summit: Securing IoT is About Avoiding Anti-Patterns
Caldwell Partners' Cyber Advisory Board Service | Linux Journal
CSC - Elmer
Penny Pinching With Open Source | The Networking Nerd
Active Data Guard services in Multitenant - Blog dbi services
Evil Tester: How to overcome Impostor Syndrome and use your brain's learning mechanisms to improve your public speaking skills
Errata Security: People can't read (Equifax edition)
What the Equifax breach means to me — an end user perspective | CSO Online
Equifax's chief security and information officers are out
Equifax: four simple steps to secure yourself – Naked Security
The Equifax Breach: What You Should Know
Penetration Testing on Remote Desktop (Port 3389)
More fallout from Equifax data breach
10 steps for US multinational employers preparing for GDPR
How to Fail Safe Your Data in the Cloud or When It’s Shared with 3rd Parties
Unsupervised Learning
Step by Step FTP Penetration Testing in Ubuntu
Are US ad tech firms ready for the GDPR?
Equifax breach exposes healthcare vendor vulnerabilities - Modern HealthcareModern Healthcare business news, research, data and events
How does the Equifax data breach affect health care?
Equifax's Colossal Error: Not Patching Apache Struts Flaw
GitHub - A-mIn3/WINspect: Powershell-based Windows Security Auditing Toolbox
Equifax’s Latest Data Breach: Argentina - HealthcareInfoSecurity
antivirus versus antimalware
Checkpoint Research Midyear Cyber Attack Trends 2017
Latest Equifax Bungle: Predictable Credit Freeze PINs
Cynic's Guide to the Equifax Breach: Nothing Will Change
Installing Kali and Metasploitable on VirtualBox » Greenjam94's Infosec Blog
AWS EC2, Default NAT, and Security Groups
The Four Things a Service Business Must Get Right
AWS IAM Security Terminology Primer
Some Quick Takeaways from the 2017 Verizon DBIR
How to Download Your LinkedIn Profile as a Resume
Vizualize.me: Visualize your resume in one click.
SSH: Practitioner Consideration Guidance download
You Can’t Protect Yourself from the Equifax Breach - TidBITS
Unpatched Open Source Software Flaw Blamed for Massive Equifax Breach
Beware of the Bashware: A New Method for Any Malware to Bypass Security Solutions - Check Point Research
New tools for healthcare Are They Right For You?
Big List of Ways To Protect Your Credit: Free Credit Monitoring, Credit Locks, Fraud Alerts, and Credit Freezes — My Money Blog
Time Tracking Software with Screenshots & Employee Monitoring
MDISS Launches ‘WHISTL’ | NH-ISAC, Inc. | Healthcare Information Sharing, Threat Intelligence, Healthcare Cybersecurity
Computer Networking — CNP3www 2014 documentation
Vulnerability & Patch Management Program (VPMP)
HL7 Data Interfaces in Medical Environments: Understanding the Fundamental Flaw in Healthcare – Linux Included
HL7 Data Interfaces in Medical Environments: Attacking and Defending the Achille’s Heel of Healthcare – Linux Included
Radiology Confronts Reality of Global Cyberattacks
Absolute vs. Relative Standard of Living: What is Enough? — My Money Blog
Guide to Enterprise Patch Management Technologies
Affordable, editable & professionally-written information security policies and standards based on NIST 800-53 and ISO 27002. Information Security Risk Assessment Template. NIST 800-53 and ISO 27002 versions for PCI DSS, HIPAA, GLBA, FACTA, MA 201 CMR 17, NIST 800-171, DIACAP, NIST Cybersecurity Framework and FedRAMP compliance.
Great Smoky Mountain Railroad
Listener valid node checking | DBA
Configuring VNCR for 11.2.0.4 Oracle RAC – Andy Colvin's Oracle Blog
Extreme slow RDP performance on Windows 2012 R2 server running on VMware ESXi - By Ulrich Krause - eknori.de
Essential Tools for Producing High Quality Podcasts on Linux - Make Tech Easier
Ben Franklin Circles | Transform Your Life, Transform Your World
GIAC Information Security Expert | GSE Certification
SOC 1 (SSAE 16/SSAE 18) and SOC 2 Overview of a Service Organization
https://www.integrigy.com/files/Integrigy_Oracle_Listener_TNS_Security.pdf
Joords Oracle DBA blog: Secure the Oracle Listener
Help your VNX storage engineer: Enable performance data logging! - FastStorage
Securezoo Articles
Terence Luk: Update: Securing Citrix NetScaler VPX to score A+ rating on SSL Labs
12 Easy, Attractive, and Free Infographic Resume Templates
10 Things You Should NOT Put on Your Resume
List of Master of Science (M.S.) in Cybersecurity Degree ProgramsCybersecurity Ventures
Automatically updating the version number in a PowerShell Module – How I do regex | SQL DBA with A Beard
Dependency Walker (depends.exe) Home Page
Understanding Medical Device Security ~ Cyber Thoughts
Cybersecurity and Medical Devices: 'Ducking Bullets'
Ransomware 1H 2017 review: Global outbreaks reinforce the value of security hygiene – Windows Security blog
How to get some free IT training resources? – vMusketeers
Almost half of IT security incidents are caused by company employees, report says
Understand how to extract hashes from SQL server logins before you regret | CQUR...
Evolution of Linux containers | Opensource.com
30 Cybersecurity Skills You Need To Become a Windows Security Pro [slide deck] |...
Aspiring Chief Information Security Officer? Here are some actionable tips from ...
Security and the Board ~ Cyber Thoughts
Insiders: The often forgotten threat ~ Cyber Thoughts
Confessions of a LinkedIn Imposter: We Are Probably Connected | CYBERSECURITY I/...
Turning Cybersecurity into a Strategic Advantage ~ Cyber Thoughts
Microsoft 365 and Enterprise Mobility + Security – Enterprise Mobility and Secur...
How to prevent phishing: 11 tips
Awards
Spafford Recognized With One of the Indiana’s Highest Honors - CERIAS - Purdue U...
IT Governance « Center for Information Systems Research - MIT Sloan School of Ma...
6 Key Slides to Include in Your IT Budget Deck | Apptio
Strategic Alignment - Venkatraman
A strategic approach to IT budgeting
Benchmarking the IT Organization
Cost benefit analysis – some practical examples
Cost-benefit analysis (CBA) - Clinfowiki
Clinfowiki
Benefit-Cost Analysis: The Concise Encyclopedia of Economics | Library of Econom...
Run, Grow and Transform the Business IT Spending: Approaches to Categorization a...
PMAP: Ordering Service | Information Systems & Computing (ISC) | University of P...
Three reasons why ISO20000 certification is NOT ITIL V3 certification | The IT S...
ITIL and ISO 20000
ISO/IEC 20000 and ITIL - The Difference Explained
What is Hardening? - Definition from Techopedia
Medical Device Patch Management Factors for Strategy and Execution
Checks to ensure fail-safe Cyber Security
Harnessing Feedback Loops to Drive Business Agility | CIO
The Agility Loop « The Talent Code
CIOnet
Microsoft Word - Conceptual Foundations of the Balanced Scorecard_3.17.10.doc - ...
What is the Balanced Scorecard?
Canadian Data Privacy Law Part 1: The Private Sector
Andy Neely: What is Servitization?
Servitization: Home
EclEmma - JaCoCo Java Code Coverage Library
Welcome to the SC Midlands Chapter of ISACA Site!
Downtime sucks! Designing Highly Available Applications on a Budget - Tekhead.it
Long Term Data Retention - What do I do? - Tekhead.it
Screensaver Operations 1.5 Released - The Grim Admin
What are the GDPR requirements? | CSO Online
Best HSA Plan Provider For Long-Term “Healthcare IRA” Investing – Morningstar — ...
sysadvent: Day 20 - How to set and monitor SLAs
How to use Vi: a minimalist guide « Tim Anderson"s ITWriting
The Technology chronicle!!!: Cloud Security - Risk factors
The Technology chronicle!!!: Cloud security - CSA domains
Dell Precision 5520 Mobile Workstation review: The Ubuntu Linux laptop for power...
A History of Open Source GIS, from Humble Beginnings to World-Changing Applicati...
How to Secure Your Linux Desktop with Iptables - Make Tech Easier
Pete Finnigan - Oracle and Oracle security information
How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 3...
How Microsoft EMS Can Support You in Your Journey to EU GDPR Compliance – Part 4...
How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 1...
How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 2...
How to Install Snipe-IT (IT Asset Management) on CentOS and Ubuntu
Snipe-IT
EMD GDPR whitepaper
ME Student Page
All About Circuits - Electrical Engineering & Electronics Community
SOC Compliance - Amazon Web Services (AWS)
APWA Uniform Color Code for Marking Underground Facilities
Yocto Project | Open Source embedded Linux build system, package metadata and SD...
PMP Question of the Day - Stay focued on your studies with a daily PMP
CISSP (8 Domain) Certified Information Systems Security Professional
45 CFR Part 164 - SECURITY AND PRIVACY | US Law | LII / Legal Information Instit...
eCFR — Code of Federal Regulations
Quality System (QS) Regulation/Medical Device Good Manufacturing Practices
Studying the Effectiveness of Application Performance Management (APM) Tools for...
Healthcare Cloud Managed Services, Healthcare IT Managed Services - ClearDATA
How to Select A Managed Service Provider as a Healthcare Organization
Managed It Services for Healthcare | Continuum
IT Services for Healthcare Organizations
Managed IT Services for Healthcare
Health Care IT Solutions | Managed Services | McKesson
Need a rack? This is pretty neat. | ServeTheHome and ServeThe.Biz Forums
Planning for a PACS Implementation – Three More Tips | Freeland Systems
Eight Keys to a Successful Implementation of PACS
PACS Academy - Steps to PACS implementation
(91) Can hackers break my heart? | Marie Moe | TEDxVicenza - YouTube
Key considerations when replacing your RIS/PACS | Articles and white papers | Ra...
Open-spec, RPi-style SBC features new Rockchip RK3328
Rock64
You Can Create Your Own Ubuntu 17.04 GNU/Linux Distro Using the Latest ExTiX ISO...
SDRcon at UAS | Unallocated Space
RFP365 | Security FAQ
RFP365 | Reinventing the RFP Process
50 RFP Management Tools for Writing, Presenting and Closing Sales Proposals - Do...
7 Ways to Get Your CEO Fired | CIO
CEOs doesn"t have a manager. Rather, they have three power groups to keep happy: Investors, who are represented by the board; customers, who control revenue, and employees, who control production.
World’s largest hedge fund to replace managers with artificial intelligence | Te...
The Dangers of Hiring a Nice CEO
Mossberg: The Disappearing Computer - Recode
Walt Mossberg’
7 CEOs Give Advice to First-Timers
The most common HIPAA violation: Human error
IT Industry Research and Analysis | Center for Cyber Safety and Education
Medical Internet of Things and Big Data in Healthcare
Meet the Millennials
CookingLight.com - Making healthy taste great
Toward new possibilities in threat management
Used To Be Cool - Fowl Language Comics
4 Paint Colors That Can Boost Your Home"s Value
Gutenberg
HathiTrust Digital Library | Millions of books online
Configuring the Dell/Quest Free/Busy Connector for Lotus Notes and Exchange - Pa...
Configuring the Dell/Quest Free/Busy Connector for Lotus Notes and Exchange - Pa...
Promote a Domain Controller with Windows PowerShell
Converting directly from binary to hexadecimal (video) | Khan Academy
Converting binary and hexadecimal values
Binary, Decimal and Hexadecimal Numbers
Open library
CyberGym
CyberGym Makes Sure You Know What It Really Feels To Get Hit By A Cyberattack
HealthSaaS | The Internet of Things (IoT) Platform for Healthcare
SMART Health IT – Connecting health system data to innovators" apps
SOC 2 Audits - Design Compliance and Security, LLC
EU Compliance and Regulations for IT security Professional
SOX COMPLIANCE - LESSONS FOR EUROPEAN SUPPLY CHAIN ORGANIZATIONS FROM THE US EXP...
Ssae 18 | The SSAE 18 Reporting Standard - SOC 1 - SOC 2 - SOC 3
Prepare your ODROID-C2 from scratch – Carsten Rieger
Odroid C2 Bests Raspberry Pi 3 in Several Ways | Hackaday
Marios" ODROID (C2) Adventures
DIY Dutch Door
From the Canyon Edge: Ubuntu 16.04 LTS Security: A Comprehensive Overview
Open Security Controller: Security service orchestration for multi-cloud environ...
How to create an Internet-in-a-Box on a Raspberry Pi | Opensource.com
[Short Tip] Call Ansible or Ansible Playbooks without an inventory – /home/liqui...
Kiwix
Blockchain: 3 big implications for your company | The Enterprisers Project
4 cool facts to know about FreeDOS | Opensource.com
FinanceProfessor.com: Podcast Episodes for Finance Classes
MartinLanner.com » Install Ansible on Debian 8 (Jessie)
MartinLanner.com » Shrink qcow2 disk for Linux VM in Proxmox
The costs of manual and automated tests – 2nd Meetup Stone Tech Saturday – Ricar...
5 Tips to Nail Your Big Presentation
4 Actions to Build Financial Independence This July 4th
10 Signs of a World-Class Resume
How to Install Gitlab On Debian 9 Stretch Linux - LinuxConfig.org
Create mini Linux servers using the Odroid C2 | Linux.org
Odroid c2
Law Firm IT: Appalachian Institute of Digital Evidence First Annual Conference
Florian"s Blog » Upgrading the ADFS farm behavior level
Alan"s Blog » Blog Archive » Create an AD Drive for Specified Domain
Don K Dennison | dondennison.com
Tymbrel | Smarter Websites | Website Management Platform for Agencies
How Much Mobile Phones Have Evolved Over the Last 20 Years | Technogog
Updating TTRSS feeds | The Cra1gster
To Jumbo or Not to Jumbo? « ipSpace.net by @ioshints
Information security and the generation gap
Monthly Notes 20 – Rule of Tech
vCenter Automated Install | Technodrone
Hackable medical devices and other security threats of the Fourth Industrial Rev...
Top 10 Highlights of FDA’s Draft Guidance on Cybersecurity in Medical Devices - ...
UpGuard | Home
#5 Scheduling Nessus Scans - Top Ten Things You Didn"t Know About Nessus - Blog ...
Processing.org
Word Cloud Generator
Word Cloud
WordCram.org | open-source word clouds for Processing
Microsoft’s Local Administrator Password Solution (LAPS)
Gartner: 5 High-Priority Challenges for GDPR
Strategies to Mitigate Cyber Security Incidents: ASD Australian Signals Director...
-
Infragard
Security Conference Ranking and Statistic
Unfreeze-Change-Refreeze
Lewin"s freeze phases
Unfreeze Refreeze: A Simple Change Model
Running LAPS Around Cleartext Passwords
Microsoft LAPS Security & Active Directory LAPS Configuration Recon – Active Dir...
Number of Working Hours Per Month | Controller"s Office
Assessing IT Control Systems
Applying COSO"s Enterprise Risk Management — Integrated Framework
IT Strategy Committee (ITSC) | Technology @ Berkeley
To Steer or to Strategize –Differences between IT Steering Committees and IT Str...
OpenSCAP Remediation : isimluk
Download Local Administrator Password Solution (LAPS) from Official Microsoft Do...
Cross-enterprise Document Sharing for Imaging - IHE Wiki
IT Landscape for sysadmins
Cyber resilience – Atkins
Project Planning a Step by Step Guide
Git - git-gc Documentation
Simple Wave Generation in Python (and SciPy) | Hackaday
DIRTY CABLES: What’s in that sample pile?
13 Most Important SQL Commands Any Programmer Should Know
Kill the Exhaust, Not Your Lungs with the Fume Coffin | Hackaday
Enhancing the security of the OS with cryptography changes in Red Hat Enterprise...
Securing Industrial Control Systems Against Vulnerabilities and Malware - Blog |...
The OPM Breach Two Years Later: Four Best Practices for Cyber Operational Excell...
Master Your Security Foundation: CIS Vulnerability Management Controls - Blog | ...
DevOps or DataOps Either Way It’s Coming to SQL Server | SQLvariations: SQL Serv...
Securely encrypt single files with AES Protect
How WannaCry Survives - HealthcareInfoSecurity
Why do millennials keep leaking government secrets? - The Washington Post
Send vCenter statistics to Graphite/Gra
Why do millennials keep leaking government secrets? - The Washington Post
Healthcare Industry Cybersecurity Report - Schneier on Security
NBlog - the NoticeBored blog: NBlog June 22 - phishing myopia strikes again
NBlog - the NoticeBored blog: NBlog June 21 - a positive spin on auditing
How to configure Port Mirroring on Hyper-V? | CQURE Academy
ToolsWatch.org – The Hackers Arsenal Tools Portal » BruteSpray v1.5 – Brute-Forc...
ToolsWatch.org – The Hackers Arsenal Tools Portal » Nix-Auditor v1.1.0 – Local A...
ToolsWatch.org – The Hackers Arsenal Tools Portal » MalwareSearch – command line...
Anthem to pay record $115M to settle data breach suit
KPMG: Cybersecurity Has Reached a "Tipping Point" from Tech to CEO Business Issu...
Talking Cyber-Risk with Executives - Dark Reading
The Folly of Vulnerability & Patch Management for ICS Networks
7 elements of a successful security awareness program | CSO Online
Most General Counsels Fret over Data Security
NSA Links WannaCry to North Korea - Schneier on Security
The 4 types of cybersecurity threats and a formula to fight them - TechRepublic
10 steps for a successful incident response plan | CSO Online
NSA Insider Security Post-Snowden - Schneier on Security
Petiti - An Open Source Log Analysis Tool for Linux SysAdmins
A Pentester’s Guide to Group Scoping – harmj0y
WannaCry? You"re Not Alone: The 5 Stages of Security Grief
Top 5 cybersecurity facts, figures and statistics for 2017 | CSO Online
Polyverse
3 mistakes to avoid when learning to code in Python | Opensource.com
How to Write an MBA Thesis
How to use Ansible to manage PostgreSQL | Opensource.com
Clint Boessen"s Blog: For Each Line in Text File Do - Batch Script
How to Install Restyaboard on CentOS 7
Restyaboard
A introduction to creating documents in LaTeX | Opensource.com
Practical OpenSCAP Security Standard Compliance and Reporting
Medical Device Security Privacy Checklist » hipaaprivacy.org
Getting Started with UI Automated tests using (Selenium + Python) | ENGINEERING ...
Medical Device Security: Resources for IT Professionals: Online Safety & Securit...
Medical Device Security: Hollywood vs. Reality | Journal of AHIMA
Medical Devices Infected With WannaCry Ransomware | SecurityWeek.Com
Successful Change Management — Kotter"s 8-Step Change Model • Leadership Thought...
Insecure Medical devices are enlarging surface of attacks for organizationsSecur...
The 8-Step Process for Leading Change - Kotter International
Four Ways to Increase the Urgency Needed for Change
Four Ways to Increase the Urgency Needed for Change -- Part II
Four Ways to Increase the Urgency Needed for Change -- Part I
Standard Ebooks: Free and liberated ebooks, carefully produced for the true book...
Paessler WMI Tester | Paessler
Japanese Last Names, Surnames | japanese-names.org
Increase IIS File Upload Limits — Robert A. Owen - Musician - Network Engineer -...
Multiple Choice Strategies
Multiple Choice Test Taking Strategies
4 ways to outsmart any multiple-choice test - Business Insider
Honda halts Japan car plant after WannaCry virus hits computer network | Reuters
AI Could Test For Autism Before It Even Emerges—But It"s No Cure-All | WIRED
Windows recursive grep command-line - Stack Overflow
Exporting and Importing Sites and App Pools from IIS 7 and 7.5 | MicrosoftPro.nl
fixing The remote host closed the connection. The error code is 0x80070057
Fixing File Upload Size Limit in IIS 7 | To Hell in a Handbasket
Health Care Industry Cybersecurity Task Force Report: Analysis and Recommendatio...
Tips on Taking Multiple-Choice Tests
Amazon’s New Customer – Stratechery by Ben Thompson
YARA - The pattern matching swiss knife for malware researchers
HHS targeting outdated regs in wake of damning cybersecurity report, WannaCry | ...
Oracle Database 12c Patching: DBMS_QOPATCH, OPATCH_XML_INV, and datapatch
Rugged DevOps: Team up release, security engineers for more secure code
Rugged Software Manifesto
Information Security and Compliance Explained | FRSecure
SQL Tuning Health Check (SQLHC) | Oracle DBA Montreal
A healthy way to do an Oracle database health-check | Carlos Sierra"s Tools and ...
Gray failure: the Achilles’ heel of cloud-scale systems | the morning paper
Why your encrypted database is not secure | the morning paper
Notes from OWASP Helsinki chapter meeting #31 – Rule of Tech
Scott Forsyth"s Blog - Why is the IIS default app pool recycle set to 1740 minut...
Cyber security is more important than Brexit in boardroom talks
Writing Your College Admissions Essay? These 14 Tools Make It a Breeze
Metadata Investigation : Inside Hacking Team – SHARE LAB
Digital organizations face a huge cybersecurity skills gap | VentureBeat | Secur...
Security liability is coming for software: Is your engineering team ready? | Tec...
BA says IT collapse came after servers damaged by power problem | Reuters
How to do well in ISACA CGEIT Exam when preparation time is short - few practica...
Open-Access Medical Image Repositories - aylward.org
Medical Imaging Talk Blog: Covering News & Advancements - McKesson | News and in...
Enterprise Imaging: How to Increase the Security of DICOM Servers
Oracle Live SQL - Scripts and Tutorials
OJVM PSU | Saroj Subramanian
Computer Security Incident Handling Guide
Cyber Threat Analysis
Business Insurance News, Analysis & Articles
eRiskHub - Welcome to the eRiskHub®
Security Risk Assessment Tool | Providers & Professionals | HealthIT.gov
Guidance on Risk Analysis | HHS.gov
DOTmed.com - Discussing the FDA"s examination of third-party providers at AAMI
(Archived) The HIPAA Security Rule Toolkit - NIST
Cyber Security Self-Assessment Guidance
Cybersecurity | Homeland Security
CSIRT, Sample Policies
POLICY 604-01: CYBER SECURITY INCIDENT RESPONSE
Maine Cyber Security Center
Small Business Cyber Security Guide
Passing the CISSP Exam | Chris Neudecker is helping you learn
More study help and downloading flash streaming podcast as mp3s - Certification ...
Cyber Security Training Center, Ft. Detrick
My CISSP Experience - A Study Plan Memoir
Home | Bromium
Cyber Security Training Center, Ft. Detrick: Student Stuff !!
HR Insights Blog | Span of Control: How Many Employees Should Your Supervisors M...
The Fake News Machine: How propagandists abuse the internet
Wazuh · Open Source Host and Endpoint Security
More EMC VNX caveats – Recovery Monkey
EMC VNX Best Practices Whitepaper
Information Security: GDPR Data Breach - A Job for IT or HR ?
Interactive currency-comparison tool: The Big Mac index | The Economist
Oracle Database Security: Beyond checklists
Security Assessment Template
Cybersecurity: Make MDS2 part of the procurement process – The Journal of Health...
The Noun Project
Fixing MySQL Bug#2: now MySQL makes toast! - Percona Database Performance Blog
Open-Source Icons
OCR Issues a Cyberattack Response ‘Checklist’
Outdated operating systems triple the risk of a data breach
Risk Assessment Toolkit | HIMSS
Security Risk Assessment | Providers & Professionals | HealthIT.gov
Cybersecurity Framework Draft Version 1.1 | NIST
http://csrc.nist.gov/publications/PubsSPs.html
SOC Report Type 1 vs. Type 2 | SOC 1, 2, 3 Reporting Definitions | Assurance Con...
VA OIG: Poor IT security puts VA"s financial info at risk
VMware CPU Co-Stop and SQL Server Performance | Convergence of Data and Infrastr...
The biggest healthcare breaches of 2017 (so far) | Healthcare IT News
Why Employers and Employees Should Be Wary of BYOD
Profile of a rogue insider cyberbreach | CSO Online
What"s Involved in a New STIG Release? - PeteWhoDidNotTweet.com
ESXi DCUI Shutdown vs vCenter Shutdown of a host
Crowdsourcing application security closes the automated assessment gap | CSO Onl...
aS provider they help iden
DevOps & SecOps: The Perks of Collaboration - Dark Reading
British Airways blames IT meltdown on human error
Beginner"s Guide to SQL Injection (Part 1)
Printer Tracking Dots Back in the News | Electronic Frontier Foundation
Inside the WannaCry Ransomware Outbreak - HealthcareInfoSecurity
Cybersecurity Reconsidered: A New Look at Exfiltration
Securezoo Articles
Your Essential Guide to Cyber Liability Insurance - Heimdal Security Blog
Master Your Security Foundation: Harden Your Systems - Blog | Tenable™
NetworkSecurityUsingntopng - NetworkSecurityUsingntopng.pdf
Can"t Find Qualified People - EtherealMind
How and why to hire a CISO | CSO Online
Creating Virtual Machines in KVM: Part 1 | Linux.com | The source for Linux info...
Folder vs. Library in SharePoint - SharePoint Maven
Errata Security: How The Intercept Outed Reality Winner
Sending pfSense logs to the DShield project – Linux Included
Faster Where-Object In PowerShell | chentiangemalc
Security Onion Cheat Sheet – Chris Sanders
Search DHCP for MAC address | Nick"s IT Crap
netsh dhcp server dump | find /i”0123456789AB”
Bleeding edge: The intersection of Bitcoin and cyber-security – David Vassallo"s...
Healthcare industry most targeted by cyber attacks
Wireless pacemakers could make life easier for heart patients
Science Fiction Book Report Writing Tips | Technogog
Don"t forget latency when you calculate network performance
For Those Who Want to Lead, Read
Why Leaders Must Be Readers
ISO 38500 (ISO38500) IT Governance Standard
QuickFix: Add additional CDs (with mounts) to Packer VMs | Steph van Schalkwyk |...
Dash · Dash
Cybersecurity
Medical Device Security Considerations – Case Study
Wildcards in Windows – Jeremy Kuhne"s Blog
Understand Linux Load Averages and Monitor Performance of Linux
Big List of Scary Personal Data Websites + Opt Out Info — My Money Blog
https://mihin.org/wp-content/uploads/2013/09/Final-1Q2013-Cyber-Security-White-P...
Networked medical device cybersecurity and patient safety: Perspectives of healt...
Healthcare hearing illustrates why cybersecurity is a public safety issue | TheH...
Best Practice Process to Assure Confidence in the Transmission of Data for Mobil...
Sun Tzu"s "The Art of War" for Cybersecurity. - Infosecurity Magazine
Why am I a huge fan of COBIT? | Escoute
Blocking and Tackling Unauthorized Access: Tenable.io and the 2017 Verizon DBIR ...
Medical Devices: Care Benefits vs. Cybersecurity Risks
The Not-So-Delicate Art of Aligning Business Risk Management with IT SecurityWeb...
The best cyber security books out there, chosen by over 20 experts - Heimdal Sec...
The 27 best IT and tech memes on the Internet - Page 4 - TechRepublic
Security of medical devices ‘is a life or death issue’, warns researcher – Naked...
InfoSec Handlers Diary Blog - Analysis of Competing Hypotheses, WCry and Lazarus...
FBI Tech Tuesday: Building a Digital Defense with an Email Fortress — FBI
Why security leaders need to partner with their insurance companies | CSO Online
Get started with machine learning using Python | Opensource.com
Migrating WordPress From One Server To Another | PeteNetLive
The Advantage Of Being A Little Underemployed
The cost of cyber attacks will rise to $8 trillion in five years
Unsecured IoT devices pose major security risk
Implementing IPv6 In A Home Network - Tips & Pitfalls
Remote Desktop Software for Secure Access | BOMGAR
Cybersecurity Supply And Demand Heat Map
Build A High-Performing Team In 30 Minutes
CISSP-OpsSecurity-12 Flashcards | Quizlet
6 Principles For Building A Killer Team
7 Habits of Extraordinary Teams | Inc.com
7 Security Measures to Protect Your Servers | DigitalOcean
Automatic Security Updates: CentOS - Servers for Hackers
Testing Ansible Web App Roles with Selenium - Silly Bits
HTTP For the Good or the Bad
Setup Squid3 Proxy Server on Debian - Vultr.com
Install and Configure Squid3 Caching Proxy on Debian Wheezy
Squid Proxy Server Configuration in debian
Car chess set - Album on Imgur
3WoO: Alerting on DNS (IP Address) changes | Daniel Cid
M. E. Kabay Web Site
Advanced Search
zfsu: ZFS utils for offsite backup, retention and maintaining a slow mirror - Ph...
Gradle Build Tool
10 Useful Ubuntu Keyboard Shortcuts That You Might Not Know
InfoSec Handlers Diary Blog - File2pcap - A new tool for your toolkit!
CyberChef
British Airways IT failure cancels many flights out of London (updated)
Synopsys Report Final - medical-device-security-ponemon-synopsys.pdf
Pacemaker Ecosystem Evaluation.pdf - Google Drive
Buttercup
Homeland Security Secretary John Kelly on Battling WannaCry
Chipotle finds malware exposed credit card info across the US
SMB 2 and SMB 3 security in Windows 10: the anatomy of signing and cryptographic...
Technical notes, my online memory: Switching yubikeys
Brendan"s blog. Brendan Gregg"s professional blog
Strategies to Mitigate Cyber Security Incidents: ASD Australian Signals Director...
The Proper Ways to Discuss Salary in a Job Interview
5 Human-Centered Takeaways from the SANS SOC Survey – Chris Sanders
Hardening your web server’s SSL /TLS ciphers – Premier Developer
InfoSec Handlers Diary Blog - What did we Learn from WannaCry? - Oh Wait, We Alr...
Kentucky workers comp carrier survives ransomware | CSO Online
MolinaHealthcare.com Exposed Patient Records — Krebs on Security
Ethernet is 44 Years Old - EtherealMind
NIST SP 800-171: The Compliance Window is Closing Fast - Blog | Tenable™
DFARS
Protecting Medical Devices from Ransomware: A Critical Step
Big Settlement in Privacy Case Impacting 2 Patients, HIV Data
Medical Devices Fall Short in Security Best Practices
You Have One Year to Make GDPR Your Biggest Security Victory Ever
About ASIS NYC | New York City Chapter
Canadian Cyber Incident Response Centre (CCIRC)
Cyber Security
One-Pan Vegan Dishes For Meal Prep | SELF
minced
Leitner Portal
The Cost of Retaining Aging IT Infrastructure
ISACA® CGEIT® - Glossary (EN) Flashcards | Quizlet
cgeit -Framework Flashcards | Quizlet
M-CEITA
Minimalist Baker | Simple Food, Simply Delicious
Microsoft Security Only Quality Update
Further simplifying servicing models for Windows 7 and Windows 8.1 – Windows for...
NVMe 1.3 Specification Published With New Features For Client And Enterprise SSD...
Transformation and turnaround in cybersecurity: Healthcare payers and providers
Applying the Goals Cascade to the COBIT 5 Principle Meeting Stakeholder Needs
Why hospitals are so vulnerable to ransomware attacks - May. 16, 2017
WannaCry Ransomware Outburst
Wannacry Ransomware | Europol
New SMB Worm Uses Seven NSA Hacking Tools. WannaCry Used Just Two
EternalRocks
HITRUST Update Regarding WannaCry Attack on Healthcare Sector - HITRUST
Hatsize Cloud Based Training Labs - Hatsize
ORA-06512 ‘DBSNMP.BSLN_INTERNAL’ | Dbhk"s Blog
Dalai"s PACS Blog
Packer & Vagrant Tutorial: Build Virtual Machines | Codeship | via @codeship
CyberWire Podcast | ObserveIT
FDA, Industry Look for Gaps in Cybersecurity
Netcat Tutorials for Beginner
Basin Buddy | Cool Tools
Remotely disable Network Level Authentication (NLA) | Richard Skinner
psexec \\VMNAME -u VMNAME\ADMIN_ACCOUNT -p PASSWORD reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp” /f /v SecurityLayer /t REG_DWORD /d 0
Learn Anything In Four Steps With The Feynman Technique
1. Pick a topic you want to understand and start studying it. Write down everything you know about the topic on a notebook page, and add to that page every time you learn something new about it.
Seth"s Blog: Three ways to add value
Windows Defender Antivirus VDI deployment guide | Microsoft Docs
What was the IBM PS/2? - The Silicon Underground
The Need for IT Operations Agility: Lessons of WannaCry – DiscoPosse.com
WannaCry–Everything You Need to Know | Technogog
Windows AMIs Without The Tears
Using Vagrant to Build a Manageable and Sharable Intrusion Detection Lab
Provisioning Vagrant Windows Environments with PowerShell Desired State Configur...
Best Practices with Packer and Windows
HHS Ramps Up Cyber Threat Information Sharing
ToolsWatch.org – The Hackers Arsenal Tools Portal » hsecscan – HTTP Headers Scan
ToolsWatch.org – The Hackers Arsenal Tools Portal » ProcDOT v1.2 – Visual Malwar...
ProcDOT
5 Security Lessons WannaCry Taught Us the Hard Way
Linfo - Shows Linux Server Health Status in Real-Time
10 Useful Tips for Writing Effective Bash Scripts in Linux
InfoSec Handlers Diary Blog - WannaCry? Do your own data analysis.
chef-windows-hardening 0.9.0 is released · DevSec Hardening Framework Blog
College and Infosec: To Degree or not to Degree? | tisiphone.net
ICS-CERT_FactSheet_WannaCry_Ransomware - ICS-CERT_FactSheet_WannaCry_Ransomware....
How to scan for machines vulnerable to WannaCrypt / WannaCry ransomware
Security is a Shared Responsibility - Thomas LaRock
General thoughts about patching | rootpool
WannaCry - Protect Yourself | PeteNetLive
OpenStack Gets...Easier | Linux Journal
Preparing Data for Machine Learning | Linux Journal
Machine Learning Everywhere | Linux Journal
Teaching Your Computer | Linux Journal
Trump’s cybersecurity order delivers nothing but more surveillance
MISSION: CISSP - The Epic Exam Experience | Fady Adel A. Assaad | Pulse | Linked...
Player 3 Has Entered the Game: Say Hello to "WannaCry" - Cybrary
UNM4SK3D: WannaCry, Bell Canada, and CIA - Cybrary
Disable SMB v1 in Managed Environments with Group Policy – "Stay Safe" Cyber Sec...
Stop using SMB1 | Storage at Microsoft
Get VAGRANT UP and Running in No Time ― Scotch
Vagrant: What, Why, and How
How the 21st Century Cures Act Impacts Medical Device Software
WannaCrypt ransomware worm targets out-of-date systems – Windows Security
WannaCry benefits from unlearned lessons of Slammer, Conficker – Naked Security
WanaCry Shows a Operational and Human Problem
Uiwix Ransomware Follows WannaCry"s SMB-Targeting Lead
Uiwix
Performance Co-Pilot
Weekend Project: Intrusion Detection on Linux with AIDE | Linux.com | The source...
WannaCry – Jithin"s blog
Oracle Public Yum Server
RPM Command: 15 Examples to Install, Uninstall, Upgrade, Query RPM Packages
Research Overview » Electronics Research Group
S.C. Gov. Henry McMaster assembles cybersecurity task force to address holes in ...
FDA on Cybersecurity for Medical Devices
How to use Sanoid to recover from data disasters | Opensource.com
FDA Cites 12 Hospitals That Didn"t Disclose Injuries and Deaths Linked to Medica...
WannaCry Ransomware Infected Actual Medical Devices In American Hospitals
Long Before "WannaCry" Ransomware, Decades Of Cyber "Wake-Up Calls" : All Tech C...
FAQ: Are you in danger from the WannaCry ransomware? | InfoWorld
TRACIE | Healthcare Emergency Preparedness Information Gateway
HHS Update #4: International Cyber Threat to Healthcare Organizations (Revised)
HHS Update #3: International Cyber Threat to Healthcare Organizations
HHS Update #2: International Cyber Threat to Healthcare Organizations
HHS Update: International Cyber Threat to Healthcare Organizations
UPDATED: #WannaCry #WCry Ransomware: an International Cyber Threat | HIMSS
IPv6 in the IPv6 in the Department of Defense
Java Melody
Admitting Your Weaknesses And Hiring To Support Them
Eric P. Bloom: Hire to your weaknesses, not your strengths
The worm that spreads WanaCrypt0r - Malwarebytes Labs | Malwarebytes Labs
DICOM Library - Anonymize, Share, View DICOM files ONLINE
Box DICOM - Medical images for the cloud
How I accidentally stopped a global Wanna Decryptor ransomware attack | Ars Tech...
System People Practices Partners Things | The IT Skeptic
National Cybersecurity & Communications Integration Center | Homeland Security
Cyber Threat XChange (CTX) - HITRUST
The Certification Commission for Health Information Technology (CCHIT®)
Disable SMB Version 1.0 in Windows 10 - RootUsers
Steps to Enable and Disable SMBv1, SMBv2, and SMBv3 in Windows Servers
North Korea implicated as source of global cyber attack | BreakingNews.ie
Public Workshop - Cybersecurity of M...
Fusion Center Locations and Contact Information | Homeland Security
South Carolina Information & Intelligence Center (SCIIC)
Combatting the Massive Wave of WannaCry Ransomware | HL Chronicle of Data Protec...
Cloud-based Governance, Risk and Compliance Solutions
Microsoft PKI Planning and Deploying Certificate Services Part 2 | PeteNetLive
Microsoft PKI Planning and Deploying Certificate Services | PeteNetLive
PaulT : Home
Ansible Life
Car Hacking: The definitive source
One for the history books: 2016"s year in DDoS attacks
Using a Makefile with Markdown Documents · Scott"s Weblog · The weblog of an IT ...
The Maturation of Cybercrime - HealthcareInfoSecurity
NIST Issues Draft Guidance for Wireless Infusion Pumps
Security Scoring and Grading for Container Images - Red Hat Customer Portal
How 4 Types of Cyber Threats Break Your Online Security [INFOGRAPHIC] - Heimdal ...
Website Flaw Let True Health Diagnostics Users View All Medical Records — Krebs ...
FDA Ramping Up Digital Health Cybersecurity Efforts
Host Profiles CLI
Master Your Security Foundation: Know Your Software - Blog | Tenable
Install the CORE Network Emulator from source code | Open-Source Routing and Net...
Ara: ansible run analysis | Frits Hoogland Weblog
IBM Domino - The absolute definition of elegance in architecture and operation
ssh_scan - Verifies Your SSH Server Configuration and Policy in Linux
Research
vSphere 6.5 – Upload log bundles to VMware direct from the vSphere Web Client
3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPC...
TPCRM
Scan Website Vulnerability using Uniscan (Beginner Guide)
5 Ways to Directory Bruteforcing on Web Server
The Enterprise IoT Security Checklist for Today - and Tomorrow
GDPR: Ignore It at Your Own Risk
iso27k Toolkit
Cloning and Snapshots on vSAN when policy requirements cannot be met - CormacHog...
Orchestration with MCollective | Linux Journal
New Ansible os-, ssh- and mysql-hardening releases · DevSec Hardening Framework ...
Errata Security: Some notes on Trump"s cybersecurity Executive Order
NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Inter...
Top 3 Ways to Win the Deal with A Live Sales Demo | 3Sharp
SQL Server 2017 Showplan enhancements – Blog do Ezequiel
NHS hospitals hit by ransomware attack
One in four European businesses don"t know GDPR is coming
Gray Consulting | Re-Engineering Medical Imaging Since 1991
How to Insert a Checkmark in Microsoft Word
12 Most Useful Google Chrome Browser chrome:// Commands
How would you plan a network migration?
InfoSec Handlers Diary Blog - What Can You Learn On Your Own?
Boston Fed conference: Security still comes down to the basics | CSO Online
Is it ethical to do constant criminal background checks on employees?
Turns out, pacemaker security is terrifying
The Economics of Ransomware - HealthcareInfoSecurity
Homeland Security Issues Warning on Cyberattack Campaign
Ransomware Defense: The Do"s and Don"ts - HealthcareInfoSecurity
Best Practices for Addressing Vulnerabilities
Getting Started with Foreman: Part 3 | BeryJu.org
The Cyber-Committed CEO & Board
CEOs and boards should do these three key things:
Healthcare Breaches Hit All-Time High in 2016
How to compare SAP user roles « SAP Basis Cafe
RSUSR050
A Better Way to Measure Cyber Risks - HealthcareInfoSecurity
Stop Wi-Fi Thieves: How to Secure Your Wi-Fi From Neighbors Stealing It
SharePoint: Best practices for uploading more than 5000 items to a library/list ...
Friday Fun: Listing WMI Namespaces
IIS Services: HTTP.sys, W3SVC, WAS, W3WP, oh my! – WebApps
The Best Twitter Cybersecurity Accounts You Should Follow - Heimdal Security Blo...
InfoSec Handlers Diary Blog - The story of the CFO and CEO...
Red Hat CEO: Planning is Dead
Docker Enables Polyglot Shops - via @codeship | via @codeship
Kubernetes – Overview – Fabricio Sanchez"s Blog
Cisco and Viptela – The Price of Development Debt | The Networking Nerd
DevOps success: 4 reasons teamwork comes first | The Enterprisers Project
aldeid
Minimum Security Standards | University IT
Improving File Integrity Monitoring with OSSEC - /dev/random
How to Setup osquery to Monitor Security Threat on Ubuntu
ssh_scan: A SSH configuration and policy scanner for Linux and UNIX server – nix...
Why Remote Workers Are More Efficient Than Traditional Desk Employees - Business...
JXRay - See through your application - Home
Diagnostic Imaging Appropriateness Tools in Primary Care
Welcome to the Joint Department of Medical Imaging
JDMI | medical-imaging.utoronto.ca
Check_MK Nvidia
(52) JDMI develops Coral Viewer to replace eFilm - YouTube
JDMI’s peer review system gaining traction across province | Canadian Healthcare...
Packer templates for creating a basic malware analysis lab, as per the recommend...
Vagrant Windows Boxes and Puppet
Bento
Packer templates for building minimal Vagrant baseboxes
CGEIT - Certified in the Governance of Enterprise IT
How to Become CGEIT Certified
Vuls: VULnerability Scanner
Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
Vulners - Vulnerability Data Base
Defending against medical device hacker threat, MedCrypt CEO seizes an opportuni...
QuiO
MedCrypt - Medical Device Security as a Service
CGEIT Exam Job Practice: 2013
Employee Benefit Research Institute | EBRI
Is Intel’s Management Engine Broken? | Hackaday
RaSCSI
Cybersecurity Awareness Training | ESET
Security Awareness Training | KnowBe4
Ransomware"s biggest target is the healthcare sector
The gig economy has flipped the job market on its head
Containers are not VMs - Docker Blog
Moby
Quickly build a Windows lab with VirtualBox, Packer, Vagrant and Chocolatey | Th...
INetSim: Internet Services Simulation Suite - Project Homepage
USAFacts
VMTraining Blog: Unlocking and resetting the VMware vCenter Single Sign-On admin...
Help! Can not reset administrator password. |VMware Communities
Changing the vCenter Server database user ID and password (1006482) | VMware KB
VMware: vCenter 5.x/6.x: How to reset administrator@vsphere.local account passwo...
How to reset administrator@vsphere.local password in vCenter 5.5 | elgwhoppo"s v...
Cleaning Schedule Architecture: Building One that Works for You
pander: An Pandoc writer in R
All+you+need+is+text+–+Markdown+(via+pandoc)+for+academia+|+Sustainable+Research
Bash getopts: reading $OPTARG for optional flags? - Stack Overflow
syncope.apache.org
Official Windows 10 / 8.1 / 7 ISO Installation Media Download Links (Microsoft T...
LUKS: Add a Backup Key, Backup, Restore and Delete LUKS Volume Header
Marie Moe on Medical Device Security
Alan"s Blog » Blog Archive » ShareEnum Alternative
Rotate Oracle logs – My Linux Place
Unmount and Clean up a Wim Image using DISM
Capturing and Alerting on SQL Server Configuration Changes
Triangulation 238 The Future of the Professions
Taiga.io
Making Diagrams with graphviz
Keywhiz
2017.Canadian.Physician.Leaders.Conference.pdf
WordPress Migration: Easy as A-B-C, 1-2-3 | Microsoft Azure Open Source Developm...
There are four types of AI: Here"s how you can recognize them
HP Elitebook 8440p overheating - The Silicon Underground
We Can’t Control Devices and People, but We Can Control the Network
Evil Tester: Do you know what your framework is doing? A quick use of WebPageTes...
Evil Tester: Notes from Glenford Myers Advances in Computer Architecture
TLDR; Abstractions are not new, have never been easy, and have always been important when architecting our Systems.
Evil Tester: Notes on Structured Analysis and System Specification by Tom Demarc...
TLDR; Time unfortunately has not been kind to this - it still has moments of well worth reading but it also has sections where you hope no-one follows the instructions lest they doom the project, but the chapter on estimation is well worth reading.
7 tips for effectively rolling out emergency patches - TechRepublic
5 ways to make sure users comply with patch releases - TechRepublic
Server Side Injection Exploitation in bWapp
bWapp
How to Detect Sniffer in Your Network using shARP
shARP
7 Pieces Of Career Advice To Cybersecurity Newbies From Renowned Experts | CQURE...
Bernard Layton
SOC-as-a-Service: All the Benefits of a Security Operations Center Without the H...
What happens when a vendor doesn’t patch its software? – Naked Security
Supporting improved cyber security across health and care - NHS Digital
CERT/CC issues vulnerability advisory for "Equation Group" exploit targeting IBM...
HHS Smacks Heart Monitoring Firm with $2.5 Million Settlement
(ISC)² Delivers Recommendations to White House Chief of Staff, Urging Prioritiza...
Tracking Active Directory Operations with PowerShell Commands
What’s in my (Hacking Con) bag? | tisiphone.net
2017 Open Source Security and Risk Analysis | Black Duck Software
CHICKEN LETTUCE WRAPS recipe | Epicurious.com
Installing Gentoo Linux on ZFS with NVME Drive (Part 2) – Guy, Robot
Install Kali Linux Tools Using Katoolin In Linux - OSTechNix
katoolin
Puppet : Automate/Reset first time root password for MySQL 5.7.x – All Linux Use...
ShellCheck - A Tool That Shows Warnings and Suggestions for Shell Scripts
Remembering WDBS, the Campus Radio Station of Duke University
Fired IT workers to file discrimination lawsuit | Computerworld
Proactively Monitoring Departmental Clinical IT Systems with an Open Source Avai...
Chipotle investigating breach of payment system | TheHill
HL7D
Raspberry Pi: Top 20 projects to try yourself | IT PRO
Early Nintendo programmer worked without a keyboard | Ars Technica
Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the N...
David A. Wheeler"s Personal Home Page
Home : I Do Imaging
Where do CISOs fit in the healthcare C-suite? | Healthcare IT News
Twitter Community Management Dashboard | Twitter Marketing Tool
How can I monitor DICOM and HL7 with PRTG? | Paessler Knowledge Base
How can I monitor DICOM and HL7 with PRTG? | Paessler Knowledge Base
HHS cybersecurity center to help healthcare orgs fight cyberthreats | Healthcare...
Open Source Software - Is it a Viable Alternative for a Healthcare Institution?
Using Mind Maps instead of Test Cases ! – Ganesh’s Blog
Tuturial: mbedTLS SSL Certificate Verification with Mosquitto, lwip and MQTT | M...
Two men admit involvement in the TalkTalk 2015 hack
Air Force enlists hackers to hunt bugs in its site
34 percent of US government agencies have had data breaches in the last year
Excel Macros Help You Automate Your Spreadsheets: Here"s Where to Find Them
Dataplicity: Remotely control your Raspberry Pi
DICOM in Python: Importing medical image data into NumPy with PyDICOM and VTK | ...
Can LinkedIn"s new apprenticeship program help diversify its workforce?
Hackers exploited Word flaw for months while Microsoft investigated | Reuters
Resources | SecureState
Brewing in Beats: Collecting auditd logs | Elastic
SecureState Blog
Jon Ramsey, Chief Technology Officer for Dell SecureWorks, discussed the ways to...
“If you protect your toothbrushes with equal zeal as your diamonds, you’ll lose fewer toothbrushes and more diamonds.” You can’t protect yourself in all places at all times from all things, so it’s about making the right decisions on what to protect from whom and when.
spagobi | 100% open source Business Intelligence
Passive Optical LAN | Nokia Networks
Password Expiration - Enable or Disable - Windows 7 Help Forums
9 Easy Ways to Break a Cisco Network
Here are some common mistakes network engineers make on Cisco gear that cause unexpected outages.
VMware NSX in Redundant L3-only Data Center Fabric « ipSpace.net by @ioshints
Gigabit card only connecting at 100mbps? Here"s the fix. - The Silicon Undergrou...
Windows network security now easier with osquery | Trail of Bits Blog
augmentd | Augment Your Security
rapid7
FIRST - Improving Security Together
André de Carvalho - Software development thoughts and more...
Audit File Access and Change in Windows
Customized File Monitoring with Auditd | Linux.com | The source for Linux inform...
Welcome to our new Open Source Lead | Government technology
Building tools to provision our machines | Technology at GDS
Anna Shipman
Anna Shipman : JFDI
A Gentle Introduction to XDS-I.b – Healthcare Interoperability
Qualio: Life Sciences Compliance Platform | QMS Software
mGSD - mGSD
Healthcare Interoperability – The musings of a HealthCare CIO/CTO
Load Balancing Medical Imaging Systems: PACS, VNA, DICOM, XDS & HL7 - Loadbalanc...
ITIL news - ITIL Version 3 ITIL Version 3 UK ITIL Version 3 System ITIL Version ...
#TipOfTheDay Enable Auto-Save in Lotus Notes
Hackers are going for your healthcare data
Life on Contract: Hacking your Taxes | Hackaday
Neural Networks: You’ve Got It So Easy | Hackaday
What You Learn Hiking The Whole Appalachian Trail : NPR
etcher
Firms worldwide say GDPR could harm their business
DOCOVA.com – Migrate Notes to DOCOVA Blog Series Part 1: What gets migrated?
How High Speed Communications Networks Are Making Remote Surgery Realistic - Mot...
High-frequency trading: when milliseconds mean millions - Telegraph
Hawaii’s online gaming curse | The Outline
Lotus Notes Deployment Tool for Numerous Platforms
Cybersecurity for Networked Medical Devices Containing Offthe-Shelf (OTS) Softwa...
Quotations for CS1
Richard Pattis Home Page
How I Got Started in InfoSec – JP
Real World Computing: Using SharePoint with OneDrive as a File Server (for Ex-Do...
John"s Network Oops - As Seen On Reuters - MovingPackets.net
DOUBLEPULSAR Infections On The Rise | Rendition Infosec
Top 10 ways to achieve agile security | CSO Online
Oracle fixes Struts and Shadow Brokers exploits in huge patch release | CSO Onli...
ITIL Certifications | AXELOS
Free Certification Practice Questions - GoCertify
ITIL Practice Exam | Accelerated Ideas
itil Flashcards - Cram.com
PRINCE2 Software and Methodology led Project Support Offices
Greek Yogurt with Warm Black & Blueberry Sauce Recipe | MyRecipes
Turkey Burgers with Special Sauce Recipe | MyRecipes
Creole Tomato Salad Recipe | MyRecipes
BBQ Chicken with Peach and Feta Slaw Recipe | MyRecipes
Fresh Corn Cakes with Summer Salsa  Recipe | MyRecipes
Haricots Verts & Grape Tomato Salad & Crème Fraîche Dressing Recipe | MyRecipe...
Chicken with Sun-Dried Tomato Cream Sauce - Damn Delicious
Grilled Peach, Blueberry, and Goat Cheese Arugula Salad | Two Peas & Their Pod
Best Sausage, Cheese, and Basil Stuffed Tomatoes Recipe-How to Make Sausage, Bas...
Gyros with Greek Chicken, Tzatziki and Homemade Greek Pita Flatbread - Cooking C...
Best Strawberry Balsamic Pasta Salad - How to Make Strawberry Balsamic Pasta Sal...
Baked Macaroni and Cheese | The Country Contessa
Best Cheesy Chicken Alfredo Soup - How to Make Cheesy Chicken Alfredo Soup
Tater Tot Lasagna - Totsagna Recipe
Garlic-Knot Pizza Bake Recipe - Delish.com
Wall Street IT Engineer Hacks Employer to See If He Will Be Let Go
Some Independent Software Verification Techniques Used within the FDA Regulatory...
Risk Management and Cybersecurity for Devices that Contain Software
Latest Report on National and International Cyber Security Exercises
Report: CIA, FBI hunting for insider who gave docs to WikiLeaks | TheHill
Cyber Security Online Courses | Stanford Center for Professional Development
Stop Writing Crap Code! Or You Just Might Find Yourself in Court - Tactical Netw...
FreedomBox/Hardware/Debian - Debian Wiki
Take back your data
Education Commission of the States--Helping State Leaders Shape Education Policy
ITIL Access Management: Granting access rights to those in need | 20000Academy
Opencanary
GoJS® Diagramming Components for HTML5/Canvas, by Northwoods Software®
Learn a Python script for automating the process of publishing podcasts | Openso...
Anbox - Android in a Box
Simple Server Hardening, Part II | Linux Journal
Dealing With Real-Life, Everyday Security Threats | FOSS Force
Evil Tester: Normal is the rarest of all states
Normal is the rarest of all states
Grok the GIL: How to write fast and thread-safe Python | Opensource.com
Tarsnap - Online backups for the truly paranoid
Taskwarrior - An Easy Way to Manage TODO List From The Command Line | 2daygeek
Understanding Shell Initialization Files and User Profiles in Linux
Blogging in Markdown with Jekyll | Opensource.com
How to build a static website with Jekyll | Opensource.com
Smaller Java image using Docker multi-stage build
PowerShell Summit 2017 Demo Files
Privacy and Windows 10: Your Guide to Windows Telemetry
Better Linux Disk Caching & Performance with vm.dirty_ratio
vm.dirty_background_ratio = 5 vm.dirty_ratio = 80
Winston Salem Maker Lab: IR Volume Control for Sonos Connect AMP
Networking: Pin the Tail on the Headless Raspberry Pi | Hackaday
SQL Server Performance Baselining Reports Unleashed for Enterprise Monitoring !!...
Flying The First Open Source Satellite | Hackaday
Prisoners Build DIY Computers and Hack Prison Network | Hackaday
When you have a lot of time on your hands and little responsibility, crazy ideas don’t seem so crazy after all.
Victorians and Fiber, Louisville’s Quest For Fast Internet | Hackaday
"Do"s and Don"ts" for Dealing with Regulators
An Open Letter From Tanium’s CEO To Our Customers - Tanium Blog
Cybersecurity Startup Exposed Hospital Network Data in Demos
Five Principles for Improving Medical Device Cybersecurity
Former Employee Kept Accessing Engineering Firm"s Servers
Telehealth App Lawsuit Spotlights Privacy Questions
Master Your Security Foundation: Know Your Devices - Blog | Tenable
Cybersecurity Talk with Bernard Layton: Key factors that will get you hired in t...
Securing Medical Devices - The Need for a Different Approach - Part 2 ~ Cyber Th...
Securing Medical Devices - The Need for a Different Approach - Part 1 ~ Cyber Th...
Securing Medical Devices - The Need for a Different Approach - Part 1 ~ Cyber Th...
Installing Gentoo Linux on ZFS with NVME Drive (Part 1) – Guy, Robot
Research
Research
How to Take Action: 12 Habits that Turn Dreams into Reality
RESPONSE: 3 Hidden Lessons Behind Top Podcasts to Help Yours Stand Out – Ethan B...
Clint Boessen"s Blog: WSUS Console Freezes when the Server Cleanup Wizard
Time Tracking: A Great Strategy for Business Growth - Business Opportunities
That grumpy BSD guy: Forcing the password gropers through a smaller hole with Op...
EMC MirrorView Knowledgebook Releases 30 – 33
Home Assistant
G7 FUNDAMENTAL ELEMENTS OF CYBERSECURITY FOR THE FINANCIAL SECTOR
State of Software Security Reports | Veracode
Exclusive: Go inside a security operations center | InfoWorld
Buggy open source components still dog dev teams | InfoWorld Black Duck"s analysis found vulnerable Apache Commons Collections in 11.8 percent of applications it tested. Apache Tomcat was found in 10.1 percent of applications, but applications using vulnerable Tomcat versions on average had 11 high-risk vulnerabilities. Using a buggy version of OpenSSL meant introducing an average of 27 high-risk flaws to the application.
(ISC)² Security Transcends Technology
How Many Data Centers Needed World-Wide – Perspectives
GlobalSecurity.org - Reliable Security Information
No, millennials aren’t a bunch of job-hopping flakes
The Three Faces of Insider Threat Malicious Insider Negligent Insider Unsuspecting / Acting Insider
Azure Information Protection: Ready, Set, Protect! – Part 4: regulations and com...
Another Ransomware Attack Added to HHS Breach Tally
YoYoClouds: Infographic: 10 Questions CIOs Should Ask Before Moving To Cloud Feeling Cloudie,
Top 4 Strategies to Mitigate Cyber Security Incidents - Mandatory Requirement Ex...
Cybersecurity – The Legal Landscape in Canada
Using Packer to deploy VM"s in a Nested ESXi environment | metallic-badger.com
Packer vSphere Templates
[SOLVED] Windows 10 wont upgrade 10240 build to 1511 Build via WSUS - Windows Se...
Cybersecurity in Healthcare: Why It’s Not Enough, Why It Can’t Wait
Healthcare Cybersecurity Spend Rises: 4 Steps to a Wisely Spent Budget Congrats your now the CISO...Good luck.
IT Security Spending Trends - Feb 2016
Charts: Must-know healthcare cybersecurity statistics | Healthcare Dive
Windows Update error code list
Building Virtual Machines with Packer on ESXi 6 — Nick Charlton
Postmarket Management of Cybersecurity in Medical Devices
New cybersecurity guidelines for medical devices tackle evolving threats
How much space am I saving thanks to ReFS blockclone? - Virtual to the Core
Cybersecurity jobs are there for the taking. Are you ready? Joyce Brocaglia
Smart bandages will use 5G data to track your health
stagemonitor
Dashbuilder - Home
Freeboard
SQuirreL SQL Client Home Page
redhat - Can"t use ctrl+c to kill process in VM - Server Fault Ctrl C doesnt work. Alt-rightarrow to cycle to another terminal and kill the offending process.
Salt in 10 Minutes
saltstack-formulas iptables
Salting your LXC Container Fleet | levlaz
MSc Information Security
No ctrl character passthrough in the Web Client |VMware Communities
The Longer Story
VMWare Image Clone Problem: eth0 Renamed As eth1
IT Consulting Baton Rouge, IT Support Baton Rouge
Simple Scripts to Unlock, Lock, Pause & Resume your BitLocker Drive Encryption D...
One-upping the NES Classic Edition with the Raspberry Pi 3 and RetroPie | Ars Te...
UCI Machine Learning Repository: Detect Malacious Executable(AntiVirus) Data Set
The Electron Armory: Some Thoughts on Machine Learning Antivirus
Bootstrap
xkeyscore - RHEL7 Hardening
Agree to Terms of Service | Muddy Waters Research
Cybersecurity Vulnerabilities Identified in St. Jude Med...
ICS-CERT |
Randy Pausch’s Last Lecture: Really Achieving Your Childhood Dreams
Detecting insider threats is easier than you think | CSO Online
NBlog - the NoticeBored blog: Analog Risk Assessment method, ARA [UPDATED x2]
protect.io
Red Hat Delivers Advanced Network Automation with Latest Version of Ansible – Mi...
Understanding the Latest IT Security Employment Trend
Investigating Business eMail Compromise and Ransomware
Groups Say NIST Must Better Address Healthcare’s Cyber Needs
Cybersecurity Talk with Bruce Schneier: How to start your career in cybersecurit...
FDA warns Abbott on cybersecurity woes with St. Jude heart devices
Common Sense Guide to Mitigating Insider Threats, 5th Edition - 2016_005_001_484...
Conference on Innovative Data Systems Research (CIDR)
The Power of the Quarterly Business Review - QBR
Cmder
MSSPs add advanced threats as managed security services gain hold MSSP - Managed Security Service Provider EAAS - Experience as a Service
Former Sysadmin Accused of Planting "Time Bomb" in Company"s Database
Japan Guide - Japan Talk
Cybersecurity, hacking, hacking-resistant hardware | Homeland Security News Wire
Ask a Security Pro: Encryption Explained
Password History Analysis | Didier Stevens
MSRC-Microsoft-Security-Updates-API
RISKS TO CRITICAL INFRASTRUCTURE THAT USE CLOUD SERVICES
FAME
Frank"s Hospital Workshop
A Year in Review of Healthcare Cybersecurity Developments and Trends | HIMSS
HIMSS Healthcare and Cross-Sector Cybersecurity Reports | HIMSS
Framework to Assist Healthcare Delivery Organisations and Medical Device Manufac...
10 Steps to Cyber Security - The National Cyber Security Centre
Content of Premarket Submissions for Management of Cybersecurity in Medical Devi...
Applying 80001 - Using 80001 to Manage Medical Devices on the IT Network
Home Depot Agrees to Data Breach Settlement With Banks | Fortune.com
10 Reasons Data Centers Fail | Network Computing
A Security Risk Management Framework for Networked Medical Devices
Security Update Guide brings growing pains to Patch Tuesday
Why Auditing and Vulnerability Scanning are Different Things
Tuning auditd: High Performance Linux Auditing
A curated list of Awesome Threat Intelligence resources
Audit Daemon » ADMIN Magazine
Linux Admin Reference - Configuring Auditd in RedHat Enterprise Linux - unixadmi...
Audit Trail and Node Authentication - IHE Wiki
Understanding Interoperability with the IHE Profiles
GDPR Compliance: Technical Requirements for Linux Systems
We Tracked Every Dollar 235 U.S. Households Spent for a Year, and Found Widespre...
DevOps in a nutshell – All things Geeky
Layer 1 issue and propagating CRC errors « virtualstace.com
FRRouting OSPF
INTP vs INTJ: 5 Ways to Truly Tell Them Apart
Lights Out in Québec: The 1989 Geomagnetic Storm | Hackaday
10 Podcasts Every Photography Enthusiast Needs to Hear
Open source OTA software updates for embedded Linux | Mender
pyDash - A Web Based Linux Performance Monitoring Tool
Export SQL User Permissions to T-SQL script using PowerShell and dbatools | SQL ...
Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity |...
Setting Up Security as a Business: 3 Best Practices for Security Execs
Hunting Linux Malware with YARA - Blog | Tenable Network Security
Hard-coded passwords put industrial systems at risk – Naked Security
Are Large Teaching Hospitals At Greater Risk for Breaches?
Concise Courses | Cyber Security Training: Continuing Education
Cyber Security Conferences of 2017 | Complete List of InfoSec Events etc
Hacker Archetypes | Armed and Dangerous
Communications Cable Ratings
International Association of Privacy Professionals
Top 10 operational impacts of the GDPR: Part 1 – data security and breach notifi...
How To Install TTRSS with Nginx for Debian 7 on a VPS | DigitalOcean
Keeping focused with Admin Templates in OneNote – Microsoft Australia"s teacher ...
The internet mystery that has the world baffled - Telegraph Cicada 3301
GitLab.com meltdown, how 5 different backup strategies failed – Marksei
PowerShell & ActiveDirectory - BYOTD - Build your own test domain
regex - sed replace last line matching pattern - Stack Overflow
Steve Blank The Mission Model Canvas – An Adapted Business Model Canvas for Miss...
Why your Security Products are Inherently Insecure – DiscoPosse.com
Russia “crosses the Rubicon” with newest Shadow Brokers dump | Rendition Infosec
Easter"s End | DiscoverMagazine.com
Topic-based (issue-specific) information security policies
librecore
NBlog - the NoticeBored blog: NBlog April 7 - NZISM
Dockerizing Wordpress with Nginx and PHP-FPM on Ubuntu 16.04
Pyinotify - Monitor Filesystem Changes in Real-Time in Linux
What C-level leaders need to know about cybersecurity | CSO Online
NZ Information Security Manual (NZISM) | GCSB
File formats
HomePage -
Eclipse Software | Distribution Solutions | Epicor
Keycloak
Introduction to Keycloak
If You Don"t Know Much About Cybersecurity, You"re Not Alone
Nail that Startup Interview with these 10 Tips – BizSpark Australia
USB-Canary
The Shocking Truth About Transformerless Power Supplies | Hackaday
CTI Keynote, Cliff Stoll - (Still) Stalking the Wily Hacker - Fun with virtualiz...
Changes coming to TLS: Part Two - Red Hat Customer Portal
Changes coming to TLS: Part One - Red Hat Customer Portal
Boosting Healthcare Sector Cybersecurity: Essential Steps
GDPR Doesn"t Need to be GDP-Argh!
5 ways data classification can prevent an insurance data breach | CSO Online
Testing AnyConnect With Packet Tracer | PeteNetLive
RHEL 7 STIG v1 updates for openstack-ansible-security - major.io
IT leaders share how they quell cybersecurity attacks | CSO Online
Roast Potatoes Recipe - Allrecipes.com
Asparagus and Chicken Stir-fry Recipe | Food Network Kitchen | Food Network
Shrimp and Snow Pea Salad Recipe | Ellie Krieger | Food Network
White Papers - Preparis
“Cybersecurity in the Heath Care Sector: Strengthening Public-Private Partnershi...
“Cybersecurity in the Heath Care Sector: Strengthening Public-Private Partnershi...
“Cybersecurity in the Heath Care Sector: Strengthening Public-Private Partnershi...
The Five Stages Of Your Business Lifecycle: Which Phase Are You In?
Nartac Software - Download
Enabling Jumbo Frames in Solaris « Gopi Desaboyina Solaris Blogs
National Public Media Public Radio Audience Demographics - NPR Profiles
Svalbard Global Seed Vault - Wikipedia, the free encyclopedia
Arctic World Archive
No Sweat DIY Infographics | Beth’s Blog
CyberEdge 2017 Cyberthreat Defense Report
A Day In The Life Of A DBA Manager
Remote DBA Support & Database Management Services Provider | Datavail
VMware from HP Certification and Support | HP®
KVM Performance Limits for virtual CPU cores | Open-Source Routing and Network S...
BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker
How To View BitLocker Disk Status
A Penetration Testing Checklist For Linux Machine – Intrusion Discovery - Cybrar...
ZFS SLOG/ZIL Drive (Revisited) - Calvin Bui
To SLOG or not to SLOG: How to best configure your ZFS Intent Log
dripcap
A performance deep dive into tablespace encryption | Frits Hoogland Weblog
Texas Specialty Practice Suffers Ransomware Attack
Tips on how to get all 5 AWS certifications in 1 month – Gabe"s Blog
Temporary directory for a shell script TMPDIR=$(mktemp -d) trap "rm -rf $TMPDIR" EXIT
About Swan · Swan
How to build a smog sensor with a ESP8266 microcontroller | Opensource.com
NTPsec: a Secure, Hardened NTP Implementation | Linux Journal
Surviving guide with Ceph and Proxmox · Igor Moiseev
Downtime sucks! Designing Highly Available Applications on a Budget - Tekhead.it
Cleaning copper contacts - The Silicon Underground
Your Basic Guide to RMDs -- The Motley Fool
Windows server 2012 shows as Windows 6.3 in WSUS console – Formatting the system...
ZFS, BTRFS, XFS, EXT4 and LVM with KVM – a storage performance comparison
Security
The unique dialect of Threat Intelligence | Stephen Northcutt | Pulse | LinkedIn
Mr. Robot and the Insider - Blog | Tenable Network Security
Bring Unknown Assets and Shadow IT into the Light - Blog | Tenable Network Secur...
“You need to see it to secure it.”
The Top 50 Must-Attend Information Security Conferences | Digital Guardian
Institute for Critical Infrastructure Technology
Archimedes | Archimedes
Waclaw Chrabaszcz
Cyber Security for Defense 2017
National Health Information Sharing & Analysis Center The National Health ISAC (...
DITTA Emphasizes Its Commitment to Cybersecurity - 24x7 Magazine
DITTA
Looking at cybersecurity too.
Alom, Ilom, & Elom Part I | Fatmin
Managed Service Accounts: Understanding, Implementing, Best Practices, and Troub...
lanmaster53.com
Secure Password with PowerShell: Encrypting Credentials - Part 2 - PDQ.com
Secure Password with PowerShell: Encrypting Credentials - Part 1 - PDQ.com
Mental Models I Find Repeatedly Useful – Medium
Federal Cybersecurity Whitepapers, Case Studies, Videos | EiQ Networks
RMF and Its Place in Security Certifications: Corsec
IFSEC-Periodic-Table-of-Security-full-size.jpg (2257×1597)
Cybersecurity Startups Take in More than $8B Over 892 Deals
Scans to POAM - I-Assure
DIACAP vs. RMF - 10 Major Improvements |TechRoots Blog
CACI RMF Eagle Toolset
Remove the #DIV/0! Error in Excel
=IF(ISERROR(
Risk Management Framework
DSS / NISP Risk Management Framework (RMF) Information and Resources
DCAA - Contract Audit Manual
Healthcare Vendors Identified as the “Unlocked Backdoor to Healthcare Data"
TSP board lagging behind on cyber updates, closing audit recommendations - Feder...
SOC 2 - AICPA
TSP Section 100
Service Organization Control (SOC 2)
Turn that Pi Zero into a Streaming Camera, Step-by-Step | Hackaday
SQL Server On Linux: Core-minidumps and Breakpad – SQL Server According to Bob
6 House Repairs To Tackle | Bankrate.com
Linked - FCC: Your cybersecurity isn"t our problem
Software is Eating the Network: Going Native on Network Virtualization - The Net...
How to Create a Wifi Hotspot in Ubuntu - Make Tech Easier
How to Enable and Monitor Firewall Log in Windows PC
System Requirements for Dragon NaturallySpeaking 13
"Black box" technique may lead to more powerful AI
Aruba Instant Access Point Example Configuration Walkthrough
Creating CentOS 6.5 virtual machines with Packer and Nested ESXi | On the Edge o...
A Red Teamer’s Guide to Pivoting | Hackaday
DSHR"s Blog: Threats to stored data
Shut Up and Say Something: Amateur Radio Digital Modes | Hackaday
COMM 202: Introduction to Communication Technology
OpenIAM - Open source Identity and Access Management | Home
Firewalling on Solaris 10 | Sonia Hamilton
TechExams.net IT Certification Forums - Powered by vBulletin
Packer, where DevOps begins
Leveraging NIST Standards to Build Your Enterprise Security - Blog | Tenable Net...
Tunneling Slack traffic through ssh tunnels
Takeaways from Bruce Schneier"s talk: "Security and Privacy in a Hyper-connected...
How to stop insider threats | CSO Online
My favorite PowerShell one-liner – Poshoholic
NVD - National Checklist Program Repository
The United States Government Configuration Baseline (USGCB) - NIST
Microsoft Word - Blue Sheets and Strategic Account Planning_UiSee.doc - 6BlueShe...
TensorFlow
Secure HTTP (HTTPS) - Pulse
rtop - Tool to Monitor Remote Server over SSH | 2daygeek
Two Ways GDPR Will Change Your Data Storage Solution | Linux Journal
General Data Protection Regulation (GDPR)
Linux Laptop: Display Battery Status And Thermal Temperature From Command Line
Sizing for large VMDKs on vSAN - CormacHogan.com
Multi-tenant network challenges - Blah, Cloud.
DIY SAN/NAS – fast, reliable, shared storage, with FreeNAS and switchless 10 Gbp...
DIY SAN/NAS – quest for fast, reliable, shared storage with a twist of ZFS! (Par...
How worried should your organization be about cyber espionage? | CSO Online
Ex-IT director accused of accessing his former employer for two years – Naked Se...
pfclscan
Customer security awareness: alerting you to vulnerabilities that are of real ri...
Cyber Security – A Mega Guide to Learn Everything You Need to Stay Safe Online -...
Breach Involving Encrypted Devices Raises Questions
Hospital Breach Lawsuit Gets Class-Action Status
Moving From IT-Driven to Business-Driven Security
Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Prote...
Who’d want to be a CISO? ~ Cyber Thoughts
Open19 - Home
These 10 people may be your greatest inside security risks | CSO Online
Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals - eSecurity ...
Brian Jack, chief information security officer at KnowBe4, breaks it down into its parts:
5 Ways CISOs Could Work Better with Their Cyber Insurers
7 Steps to Transforming Yourself into a DevSecOps Rockstar
Future of the SIEM
Intro to Cyber Insurance: 7 Questions to Ask
Malware Explained: Packer, Crypter & Protector - Dark Reading
Irish Soda Bread {Gluten-free}
How to list updates that have been installed on your Windows Server 2016 machine...
ISACA Certifications List | Training, Benefits, Salary and Jobs
Understanding Oracle RAC/Standby/Replication Environments
Oracle Active Data Guard Best Practices Standby For More Than Disaster Recovery
Report says ISACA certifications earn top pay premiums - Infosecurity Magazine
“ISACA certification holders can benefit from deeper career knowledge and higher pay, and their employers benefit from being able to identify an employee’s dedication to the field and commitment to ongoing professional development, as well as demonstrated proof of knowledge”, he explained.
Stay Interview Guide
Instant SQL Formatter
Reflections Upon Deception and Protean Security Tactics
Seth"s Blog: The reason we need the FDA (hint: it"s marketers)
Modern DIY FM radio | Hackaday
Enhancing your organization’s vendor risk management process. | Corl Techn...
ITIL-Checklists - IT Process Wiki
15 Top Health Systems Study
2017 | 100 Top Hospitals
Server Hardening Checklist
Debian preseed
Cyber security spending highest for financial institutions
Why ethical hacking is the top job of 2017
Intel® NAS Performance Toolkit
Cognitive Capabilities - The Future of Cyber Security
Guest Post: The “Wicked Problem” of Cybersecurity | The D&O Diary
The Power of Stay Interviews by Dick Finnegan
Home Page
Xymonton [monitors]
Alva L. Couch
Simple Day to Day Administration « The Surly Admin
NITRD
ISAO Standards Organization – Improving the Nation"s Cybersecurity Posture
Health Information & Cyber Security In Michigan
Michigan Healthcare Cybersecurity Council
Michigan Small Business Development Center Launches “Small Business, Big Threat”...
Learn a language where and when it suits you | Radio Lingua Network
Bizagi Business Process Modeling & Notation (BPMN) - Free Download
ProxBash - a bash script to manage Proxmox VE - Raymii.org
NAS performance tester (C#)
UL’s Cybersecurity Assurance Program
Cybersecurity | UL
Why Does a Small Business Need an Information Security Program? | Mike Parsons |...
Green Cloud Technologies acquires cloud services provider Cirrity - Upstate Busi...
MDDI Magazine
Federal Labs
Computer and coding books from Usborne
Negative Resistance: It Shouldn’t Make Sense! | Hackaday
Fix-a-Brick: Fighting the Nexus 5X Bootloop | Hackaday
Three penetration testing tips to out-hack hackers
Overcoming the cyber-security skills gap: experience vs qualifications
Penetration Testing in Windows/Active Directory with Crackmapexec
Crackmapexec
Hiding Shell with Prepend Migrate using Msfvenom
How to Install a Production Ready Naemon Monitoring Server
Naemon
Buku - A Powerful Command-line Bookmark Manager for Linux | 2daygeek
Shift your perspective on cybercrime to realize how well you’re doing | CSO Onli...
The True State of DevSecOps
Titan - A Command line Password Manager For Linux - OSTechNix
Museums use CT scans to take the mystery out of mummies
Combine Multiple ISO Files To Burn A Single Bootable ISO Image
How DevOps is changing the face of IT – The Microsoft India Development Center B...
Secrets of a Highly Productive CIO-CISO Relationship
3,000 Industrial Plants Per Year Infected with Malware
The Best Pi Emulation Console You Can Build | Hackaday
Fragmentation: the silent killer in security management | CSO Online
rummaging through the Government"s Attic
Automatically Organize Your Downloads Folder In Linux Using `Classifier` (Comman...
7 considerations to make when securing your Raspberry Pi | Opensource.com
systemd Sucks, Long Live systemd · naftuli.wtf
Testing Your SQL Server Backups the Easy Way with PowerShell & dbatools | SQL DB...
Tim Lord | EDUCAUSE
How to patch ESXi 5 without vCenter - ESX Virtualization
Parrot Security
The Physics and Technology of Mammography
SQL Server Case Sensitive Search: Fetching lowercase or uppercase string | My Te...
Research - Information Security Forum
UpGuard Product Features
DISA STIG Compliance for IT | Tripwire
Auto-Harden ESXi 5.x Hosts - softwareab
Guest Blog from Charles Rudolph – Practice Development Manager | The Time to Cha...
Recalbox - the micro retro gaming console
PowerShell Gallery | DNS Server STIG 1.0.0.5
Training
Malware-Traffic-Analysis.net - Traffic Analysis Exercises
About « Cloud South
Bats: Bash Automated Testing System
Baked Cheeseburger Recipe | Sargento® Sliced Colby Cheese
Automated Audit using SQLMap - OWASP
Cipher Security: How to harden TLS and SSH | Linux Journal
Secure Secure Shell
Cyber security spending to reach $90bn in 2017
Threat Horizons 2019 - Executive Summary - Threat-Horizon-2019-ES_PWS.pdf
Threat Horizon 2019: Disruption. Distortion. Deterioration - Information Securit...
OTS/SOUP Software Validation Strategies | Bob on Medical Device Software
bash - How to automatically record all your terminal sessions with script utilit...
Redirecting bash script output to syslog
exec 1> >(logger -s -t $(basename $0)) 2>&1
Bash Hackers Wiki Frontpage [Bash Hackers Wiki]
The printf command [Bash Hackers Wiki]
National Initiative for Cybersecurity Careers and Studies | National Initiative ...
awesome-programming-presentations
Github Dorks
Installing Windows 7 over PXE Network Boot Server on RHEL/CentOS 7 using WinPE I...
DBASOLUTIONS - ADRCI Commands
Using your Raspberry Pi Zero’s USB wifi adapter as both Wifi client and access p...
iPXE - Screenshots
Becoming a X.509 Certificate Authority - David Pashley.comDavid Pashley.com
Ditch Your Cable Modem/ISP With a Tethered iPhone and Raspberry Pi | DaveConroy....
5 things you didn"t know about ... Java performance monitoring, Part 1
A Quick First Glimpse at Cowrie – A SSH Honeypot
  - Welcome
Letting Go of a Beloved Technology | Countries Beginning with I
Companion Data Services
Attacker"s Playbook Top 5 Is High On Passwords, Low On Malware
CPOtracker - Disaster Recovery & Business Continuity Software and Services
HATP - Openrobots
PunkSPIDER
The No More Ransom Project
www.mach37.com
dm-crypt/Device encryption - ArchWiki
Wekan — open-source kanban
VisualVM: Home
Guide to Windows Batch Scripting - /* steve jansen */
Strategyzer | Business Model Canvas
Guides, Checklists & Best Practices | University Information Security Office | G...
Cyber Security for Critical Infrastructure Protection - SCADAhacker
Vagrant and why it is useful in learning Puppet · sdorsett.github.io
Recyclebot - Appropedia: The sustainability wiki
Do Repeat Yourself, With Variations – Jon Udell
Scripted Packer build, ovftool export and Vagrant .box file creation · sdorsett....
What Businesses Can Learn From the CIA Data Breach
A List of the Best and Free PMP Exam Study Resources
Implementing CA signed SSL certificates with vSphere 5.x – Part 5– ESXi and Auto...
OpenStack ESXi and OpenStack hypervisor support | Platform9
Managing Cisco IOS Upgrades with Ansible
Heimdal Joins No More Ransom in the Global Fight against Ransomware - Heimdal Se...
How Every Cyber Attack Works - A Full List - Heimdal Security Blog
HHS Budget Cuts: What About Privacy, Security Initiatives?
Security Weaknesses Found at Yet Another Healthcare Agency
SAP Cyber Threat Intelligence Report – March 2017
Networking Grows To Invisibility | The Networking Nerd
IT pros fear cyberespionage may be top 2017 threat
History of US Information Warfare - Schneier on Security
MalwareJake: TicketBleed - making the case for packet capture
Want good cyber insurance? Read the fine print | CSO Online
A Look at MINIBIAN: A Minimalist Image for Raspberry Pi | Pi Boards
MINIBIAN
How To Automatically Organize Similar Type Of Files In Specific Folders - OSTech...
Classifier
How To Improve Laptop Battery Performance In Linux - OSTechNix
Kgif - Create a Gif File from Active Window | 2daygeek
Parrot Linux Distro Delivers Improved Security Tools
P2V: Debian Testing PXE server and Vmware Workstation 11 - Freedom Penguin
Physical computing with the Raspberry Pi | Opensource.com
Evil Tester: Top Ten Books For Testers for Huib Schoots
My First 5 Minutes On A Server; Or, Essential Security for Linux Servers
Cybersecurity Workforce Framework | National Initiative for Cybersecurity Career...
cpuburn
About | Project Hamster
Reconfigure iLo network settings using HPONCFG | My Knowledge Base
The Unix Shell"s Humble If
ORACLE-BASE - Create a Local Yum Repository for Oracle Linux 6
EnterprisePACSMonitoringwithNagiosSmokepingandCacti.pdf
network Clipart
Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Heal...
Microsoft Word - balanced scorecard.Jan2011.docx - whitepaper.Jan2011 final.pdf
Best Pfsense hardware
20,000 Worldclass University Lectures Made Illegal, So We Irrevocably Mirrored T...
Banana oat muffins make a quick breakfast or snack
Secure tunnels to localhost
The Networking Nerd | Networking With A Side of Snark | Page 2
I Hate NAT! Or Do I…? | The Networking Nerd
FCC: Your cybersecurity isn"t our problem
SCAP and Remediation | My Open Source Life
Data-stealing CryPy ransomware raises the spectre of variable pricing for files ...
Home - Mycroft
Borg calendar by mikeberger
linux - LVM dangers and caveats - Server Fault
fully automated install of virtualbox tools in windows 7 - Server Fault
ERPScan Security Scanner for SAP
vulnerability scanners - Difference between hardening guides (CIS, NSA, DISA) - ...
checkESXiBootDeviceHealth.sh
sdorsett.github.io · Things I find interesting
Deployment Configuration File and Properties
Slimming JBoss AS 4.3 | JBoss Developer
Monitoring Wonderland Survey - Nagios the Mighty Beast
Troubleshooting Drops in Performance (Sun Java System Directory Server Enterpris...
Issue board - GitLab Documentation
vSphere 6.5 p01 - Important patch for users of Automated UNMAP - CormacHogan.com
IT and Information Security Cheat Sheets
Metasploit: A Penetration Tester"s Guide to IPM... | SecurityStreet
Brian Atkinson"s Blog: .VMX Hardening Options |VMware Communities
vSphere Security Hardening Report Script 5.1 |VMware Communities
STIG it to me, RHEL6! (computer security isn"t hard!) - Red Hat Customer Portal
Automated auditing the system using SCAP - Red Hat Customer Portal
opensnoop For Linux
pisound - Soundcard & MIDI Interface for Raspberry Pi
InfoSec Handlers Diary Blog - Retro Hunting!
The CIS Critical Security Controls Explained &#... | Rapid7 Community and Blog
The CIS Critical Security Controls Explained &#... | Rapid7 Community and Blog
The CIS Critical Security Controls Explained - ... | Rapid7 Community and Blog
The CIS Critical Security Controls Explained - ... | Rapid7 Community and Blog
Cybersecurity 500 List of Top Cybersecurity CompaniesCybersecurity Ventures
Speeding up Proxychains with Nmap / Xargs
Cybersecurity Conversations For The C-Suite in 2017 - Herjavec Group
Creating console screenshots with Get-ScreenshotFromVM.ps1 | vcloudnine.de
Cybersecurity vs. Network Security vs. Information Security | SecureWorks
Project logs • TinyJaguar • Hackaday.io
Workplace collaboration survey finds employees want a more interactive approach ...
6 Need-to-Know Tips to Keep Your Company Safe From Hackers - Business Opportunit...
Introducing Threat Operations: Accelerating the Human
Does DoD Level Security Work in the Real World? | Jeff Man | Pulse | LinkedIn
Android screenshots « BenV"s notes
NixOS Linux
Burp Suite
mhddfs: join several filesystems together to form a single larger one
The Hedgehog Concept
OS Tuning - Learn how to make CentOS 6 and CentOS 7 fast! Welcome to the Tuning ...
SecurityOperationsCenter_eBook.pdf
Add EPEL repository to centOS 6 64 - CentOS
Installing signed SSL/TLS certificates for vCenter Server Appliance 5.5 (VCSA) –...
How To Record Everything You Do In Terminal - OSTechNix
sh Scripting Cheat Sheet
Hipara | Home
grokbase com
HHS’ IT ‘Strategic Plan’ Spotlights Cybersecurity, Privacy
What’s the difference between a product and a project?
Index - FHIR v1.0.2
The Top Ten STIGs
Kali Linux NetHunter | Kali Linux
Strategic Planning Company | KPI Fire
RS232 serial null modem cable wiring and tutorial
Top Cyber Security Certifications 2016 | Mr. OoPpSs | Pulse | LinkedIn
Main Page - OWASP
Seccubus
Home - AuditScripts.com
Charles Reace
rotate all the log files in the RAC environment | Oracle RAC, Virtualization and...
Using logrotate to manage log files | Oracle RAC, Virtualization and Exadata Exp...
Medical Image Format FAQ - Part 8
Technology Vendors | Healthcare Intelligence - Definitive Healthcare
Dicom3tools Software
Script for Rotating the Alert Log
Data Center Huddle
Mailing List Archive: Rsyslog freezes the box when can"t send logs over TCP
FruityWifi
FossHub
General Principles of Software Validation; Final Guidance for Industry and FDA S...
Welcome to Floodgap Systems" WWW server
NIST-Security-HIPAA-Crosswalk | HHS.gov
the healthcare industry has accounted for over 40 percent of data breaches over the last three years, and 91 percent of all health organizations have reported a breach over the last two years.
Information Security and Privacy Program | HHS.gov
RSS feeds on healthcare information security
Debunked: The uniquely Japanese "shou ga nai" | Home Japan
2017 Cybersecurity Trends Already in Action
Security Policies Matter for Disaster Recovery
SAP Cyber Threat Intelligence report – February 2017
Ask a Security Professional: WordPress Database Security Part Two — Best Practic...
Ask a Security Professional: WordPress Database Security Part One — Anatomy of W...
VMware vCSA 5.5 – Ready for Prime-time & the War Fighter – Jase"s Place
Thoughts on Education. | JK-47
Multi-tenant/VLANs behind a virtualized pfSense firewall in ESXi | JonKensy.com
BSidesLV & DEFCON Conference Tips ** UPDATED 2016! ** | JK-47
Kimai - Open Source Zeiterfassungs Software
Enduring Popularity of LG Tone+ HBS-700 & HBS-730 Bluetooth Headsets
Peter Ustinov Quotes - The Quotations Page
Performance Management tools used in higher education: The Balanced Scorecard an...
http://www.pennington.net/py/ciscoconfparse/
Automate the creation of graphs with Graphviz
PeteNetLive - The Home Of Free Tech Support and Tutorials
Evil Tester: Representation and Meaning: relating Programming, Testing, Coding a...
Implementing Academic Projects using Microsoft Technologies – Microsoft Faculty ...
Checklists & Step-by-Step Guides | SCORE | SANS Institute
Rob van der Woude"s Basic Hardware Inventory, Version 6.13
Seth"s Blog: Cost reduce or value increase?
Cybersecurity Information Sharing Act and your privacy – JP
Cybersecurity Information Sharing Act
My ITIL Experience In An Org Chart - EtherealMind
Kitchen Soap – Book Suggestion: “Dialogue: The Art Of Thinking Together”
Redundancy does not imply fault tolerance: analysis of distributed storage react...
Airconsole – Portable Serial Ethernet/WiFi/Bluetooth Console Server
Punching it Down: Insulation Displacement Connectors | Hackaday
Saved by the Bel — Understanding Decibels | Hackaday
What Voltage for the All-DC House? | Hackaday
vmware scanner
WTF are Ground Loops? | Hackaday
Logitech BRIO 4K Pro Webcam is the new gold standard [Review]
Vagrant Tutorial – From Nothing To Multi-Machine | manski"s blog
Windows Performance Counter Types | manski"s blog
Installing VMware ESXi 5.5.0 Update 3 on KVM - Fun with virtualizationFun with v...
New York"s Cyber Regulations: How to Take Action & Who"s Next
Howard A Schmidt remembered as a ‘humble’ industry giant – Naked Security
PiBakery - The blocks based, easy to use setup tool for Raspberry Pi
WiFi Antennas | Selecting a WiFi antenna
Make a home dashboard with Raspberry Pi and OpenShift | Opensource.com
Give Generously! Seven Ways To Help Open Source | Meshed Insights Ltd
Build your own secure Pine 64 Android TV for less than $50 | InfoWorld
Flash ROMs with a Raspberry Pi | Linux Journal
A Look at HASSbian: Raspberry Pi for Home Automation | Pi Boards
PiCluster 1.6 – Move your Containers to Different Hosts | Linux-toys.com
The Terminal Is Where Linux Begins - and Where You Should, Too | Tech Blog | Lin...
Increase Security Reporting with Contact Cards – Chris Sanders
KPIs For DBAs to Show Their CIOs - Thomas LaRock
Welcome to Mohiomap
Postmarket Management of Cybersecurity in Medical Devices - Guidance for Industr...
10_Basic_Cybersecurity_Measures-WaterISAC_Oct2016[2].pdf
networking - Automating Configuration of VMware"s vSwitch (OpenStack/libvirt/Nov...
Virtu-Al » PowerCLI: Easy vSwitch & PortGroup Setup
Prescriptive Topology Daemon
3006900 GI 72 Titel - GI-Proceedings.72-31.pdf
Don"t Overlook Standard Operating Procedures: Use These Apps to Put Them in Plac...
What is Prescriptive Topology Manager (PTM) & DOT? – Ethan Banks
Prescriptive Topology Manager (PTM) support with NX-API on the Nexus 9000? | Jas...
Prescriptive Topology Manager - PTM
Prescriptive Topology Manager - PTM - Cumulus Linux 3.2.1 - Cumulus Networks
Prescriptive Topology Manager - PTM
How Not To Quit Your Job - The Lone Sysadmin
cyberplanner - cyberplanner.pdf
Raspberry Pi Open Monitoring Distribution setup guide
Top 15 Indicators Of Compromise
Basics of Windows Incident Response – JP
How to Exempt Your Firm from Cybersecurity Reporting Requirements | MDDI Medical...
Why have the Dell OpenManage integration for vCenter? | Notes from MWhite
How to build a Windows 10 vSphere Template | Notes from MWhite
25 Most Frequently Used Linux IPTables Rules Examples
Multiple Vagrant VMs in One Vagrantfile
How To Cook Perfect Steak in the Oven | Kitchn
squidmagic
web-based network traffic to detect central command and control (C&C) servers and Malicious site, using Squid proxy server and Spamhaus.
Install Windows 7 over PXE from Linux without WAIK - 3. Boot Files
Hierarchical Task Analysis :: UXmatters
Make Your Own Custom Keyboard Covers • KeyCuts
7 Security Podcasts You Should be Listening to - TunnelsUP
Create an ESXi ISO that contains all Patches | Virten.net
On the Shoulders of #InfoSec Giants
Operating Systems: Three Easy Pieces
How Security Products are Tested – Part 1
Create local accounts for VMware ESXi via vMA – Geek and I
The Linux Migration: Other Users" Stories, Part 1 · Scott"s Weblog · The weblog ...
Solving Connectivity errors to SQL Server
Creating RSS/podcast feeds from iPlayer radio programmes
Data on 3.2K patients exposed at Vanderbilt University Medical Center
How sweet it isn"t: W-2s of 3K Amalgamated Sugar workers exposed
Alan"s Blog » Blog Archive » Update GPOs with Newer Version
An introduction to GNU Screen | Opensource.com
Linux cheat sheet: 16 Linux server monitoring commands you really need to know
AWS"s S3 Brought Down by Single Typo in a Server Command
Automatic DNS updates from libvirt guests
Are Virtual CISOs the answer to your security problems? | CSO Online
InfoSec Handlers Diary Blog - SSL/TLS on port 389. Say what?
Updates that simplify NIST certifications | CSO Online
HITRUST Announces HITRUST CSF Roadmap Including a New Simplified Program for Sma...
Network security demands better procurement processes | CSO Online
The State of Cyber Security 2017 | Business Security Insider by F-Secure
Pence used private mail for state work as governor, account was hacked | CSO Onl...
Yahoo data breach affects at least half a billion users | Computerworld
Top 5 Tips for a GREAT Live Demo Presentation | 3Sharp
Runecast– Proactive performance for your VMware environment–Part 2 – Knowledge B...
Runecast – Proactive performance for your VMware environment! – Part 1 – Configu...
7 universal rules of threat intelligence | CSO Online
Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses - Dark Re...
Zones of Trust: A New Way of Thinking about IoT Security
How to install the OpenVAS vulnerability scanner on Ubuntu 16.04 - TechRepublic
Social-Engineer Toolkit - TrustedSec - Information Security
A better security strategy than ‘know your enemy’: Know your co-workers | CSO On...
Using the SmartThings Hub V2 as my primary home automation hub
King Phisher
In Cybersecurity, Language Is a Source of Misunderstandings
OnionShare
Xxcopy vs Robocopy - The Silicon Underground
The most cited deep learning papers
Exploring the darker side of culture hacking | Opensource.com
Frequently Asked Questions: Submarine Cables 101
Peek - A Simple Animated Gif Screen Recorder for Linux
4 step Network bonding / teaming configuration in Linux - Kernel Talks
Verizon"s risky business: Acquiring the world"s biggest hack | CSO Online
Healthcare firms plan to increase security spending | CSO Online
FDA "guides" the way to medical device security | CSO Online
Which configuration management tool should you use? | Deimosfr Blog
Wireshark: remotely analyze tcpdump using SSH | Deimosfr Blog
Zero downtime upgrade with Ansible and HAProxy | Deimosfr Blog
Alan"s Blog » Blog Archive » Get Downtime Using PowerShell
How to Establish a Session and Authenticate with the vSphere 6.5 RESTful API - W...
The History of Bitcoin in Numbers - Business Opportunities
What the Flux: How Does Solder Work Anyway? | Hackaday
Universal Radio Hacker: investigate wireless protocols like a boss
How the DOT discovered its network was compromised by shadow IT | CSO Online
The Gitlab database incident and the Backup Checker project | Le blog de Carl Ch...
For effective healthcare data protection try a "layered" approach
Common failures of responding to security breaches in healthcare
A guide to healthcare IoT possibilities and obstacles
CISO Q&A: Healthcare information security needs more leadership
Is it possible to get a new CISO position after being fired?
What CISO certifications are the most important to have?
Healthcare firms plan to increase security spending | CIO
Aflac CISO Tim Callahan on global security, risk management
CISO job description: Business function more than IT
International Medical Device Regulators Forum
International Medical Device Regulators Forum (IMDRF)
Inside Medical Devices | Covington & Burling LLP | Updates on FDA Device Regulat...
20160125_fda_publishes_guidance_on_postmarket_cybersecurity_risk.pdf
NH-ISAC and MDISS Partner to Form Medical Device Security Information Sharing In...
Using Packer and Vagrant to install your SharePoint environments on Windows and ...
2017 Data Threat Report | Data Security Issues, Risks, Trends, and Concerns | Th...
Adding CD Drives to Packer Virtual Machines | Remcam Blog
Circuit Cellar | Embedded Engineering and Programming Information
Policy Reporter
IT decisions makers and executives don"t agree on cyber security responsibility
Clone a Firmware RAID 1 using Clonezilla - bouni"s blog
8 Tips to Pass the PMP Exam, 1st Try, No Classes | Michael B. Howard | Pulse | L...
Top Regrets of Those Who Failed the PMP Exam
The 4 Secret Ingredients to Pass the PMP® Examination
PMP Certification Study Notes 1 - Terms and Concepts - PMP Exam, Agile PMI-ACP, ...
Triple M.2 Samsung 950 Pro Z170 PCIe NVMe RAID Tested - Why So Snappy? | PC Pers...
Use Let"s Encrypt free certificates in Windows for Veeam Cloud Connect - Virtual...
Runecast | Software-defined expertise | Proactive analysis for VMware
Inxi - A Powerful Feature-Rich Commandline System Information Tool for Linux
The History of Bitcoin in Numbers - Business Opportunities
SSH Password Testing With Hydra on Kali Linux - LinuxConfig.org
Sysmon
Storage Best Practices for EDA - h11909-emc-isilon-best-practices-eda-wp.pdf
Increase trust in your organization by assuming positive intent | Opensource.com
The 101 of ELF Binaries on Linux: Understanding and Analysis
Apply Updates to Windows 7 Image Using DISM | Utilize Windows
Ansible community modules for Oracle DB & ASM – /home/liquidat
MartinLanner.com » Build a PXE boot server environment
Find out UUID of a Linux partition
Let"s Encrypt - Free SSL/TLS Certificates
TIL Reddit Recap Podcast
Why Lean Canvas vs Business Model Canvas?
VMware Tools for Nested ESXi
Plain Text, Papers, Pandoc
Specific Communication | Jamal Ahmed"s page
Understanding Prioritization | Jamal Ahmed"s page
Jolokia – Overview
LINUX CHEATSHEET – vmstat, ps, top | Kaiwan"s Tech Blog
Kanban Project Management Software
OpenSSL Certificate Authority
using /etc/hosts.allow and /etc/hosts.deny to secure unix | Jamal Ahmed"s page
Beta Testers Wanted: Use a Raspberry Pi as a DShield Sensor - SANS Internet Stor...
Taking Control of Linux Exploit Mitigations
tozores/alpine-wildfly - Docker Hub
Performing a Command-Line Installation of VMware vCenter Update Manager
aqueduct.git - automated changes to Red Hat Enterprise Linux based systems to me...
How To Get Wireless Passwords At Airports When They Don"t Have Free Wifi - foXno...
Script Get-PendingReboot - Query Computer(s) For Pending Reboot State
virtualbox.org • View topic - source ip is 10.0.2.2 for all incoming packets
virtualbox.org • View topic - Not Enough Memory Error when installing Vcenter 5....
Fossies - The Fresh Open Source Software Archive
The problems with forcing regular password expiry
Bookmark
Foxy Proxy
Private and Public Collaboration - Global Forum to Advance Cyber Resilience
DeployHappiness | Four Batch files for Quicker Troubleshooting
Storage SCP - dcm4chee-2.x - dcm4che.org Wik
Creating Your Own SSL Certificate Authority (and Dumping Self Signed Certs) | Th...
SSL: Who Do You Trust? | The Data Center Overlords
Automating Linux Security Best Practices with Ansible | Dan Tehranian"s Blog
Testing Ansible Roles with Test Kitchen | Dan Tehranian"s Blog
Automating VMware cluster remediation without DRS: PowerCLI — DAMIAN KARLSON
Virtual Appliances getting more secure with vSphere 5.5 - Part 4 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 3 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 2 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 1 - VMware vSpher...
Automate the Hardening of Your Virtual Machine VMX Configurations - VMware vSphe...
Quickest Way to Patch an ESX/ESXi Using the Command-line - VMware vSphere Blog
Unattended VMware vSphere Client Installation (One-Click Install) | Virten.net
vSphere Update Manager (VUM) (Part 3) - How to use it - TechGenix
vSphere Update Manager (VUM) (Part 2) - Installation - TechGenix
vSphere Update Manager (VUM) (Part 1) - Introduction - TechGenix
virtuallyGhetto: How to Create Bootable ESXi 5 ISO & Specifying Kernel Boot Opti...
virtuallyGhetto: How to Enable Nested ESXi & Other Hypervisors in vSphere 5.1
Automating SSL Certificate Regeneration in VCSA 5.1 & 5.5 (vCenter Server Applia...
Completely automating vCenter Server Appliance (VCSA) 5.5 Configurations | virtu...
Unsecured Endpoints in the Hospital Environment ~ Cyber Thoughts
Top Cheat Sheets - Cheatography.com: Cheat Sheets For Every Occasion
Setting up an Ubiquiti EdgeRouter to use CloudFlare for Dynamic DNS
BDD Security - Open Source automated security testing framework
How To Create A Balanced Scorecard
Stig_it_to_em--Lee_Tues_345.pdf
Lean Threat Intelligence Part 2: The foundation | Fastly
Git Cheat Sheet
How to root out corruption in your image folders | Opensource.com
Errata Security: You don"t need printer security
13 Cloud Experts Reveal the Most Important Factors in Evaluating Cloud Infrastru...
FOCA
Free and Open Source Text to Speech Tools for eLearning - eFront Blog
How To Use DM-Crypt to Create an Encrypted Volume on an Ubuntu VPS | DigitalOcea...
How To Set Up an Artillery Honeypot on an Ubuntu VPS | DigitalOcean
2015 Bootcamp Market Size Study: Course Report
How To Set Up a Basic Iptables Firewall on Centos 6 | DigitalOcean
Consul by HashiCorp
Geckoboard - Realtime Business Status Board
Dasheroo - Free Business Dashboards Done Right
Ten Of The Best Cheat Sheets For First Time Linux Admins
Cybrary - Online Cyber Security Training, Free, Forever
DSHR"s Blog: Postel"s Law again
Monthly notes 16 – Rule of Tech
Improving Linux System Performance with I/O Scheduler Tuning | via @codeship
Performance Tuning HAProxy - via @codeship | via @codeship
What is Service Process Architecture? Why do you need it? | Tom Smyth"s Blog
CaseBox
Bareos Open Source Data Protection - bareos.org
STIG - Ansible & Mindpoint Group
How do I create my own Certificate Authority (CA)
Sample Patching Policy – VMware Update Manager – ESXi Hosts | vLore Blog
The United States Government Configuration Baseline (USGCB) - FAQ
A beginner"s guide to using Hudson for continuous integration with Drupal | Thin...
Rysc Corp Products
CIO of Accenture Talks About How to Pitch IT Ideas to Execs & Why CIO’s Have to ...
TaskBoard
How to Use "Yum History" to Find Out Installed or Removed Packages Info
The 7 security threats to technology that scare experts the most | CSO Online
Simple Server Hardening | Linux Journal
From the Canyon Edge: HOWTO: Automatically import your public SSH keys into LXD ...
What Does a DBA Do All Day? - Thomas LaRock
Vyatta Config Sync Howto and Overview - Backdrift Backdrift
LVM: Please specify number of stripes (-i) and stripesize (-I) | setaOffice
Social Media Management Dashboard - HootSuite
Understanding and Leveraging the CSF - HITRUST
Security Harden CentOS 7
IPTables HowTo - Community Ubuntu Documentation
(Outdated) UniFi - Set minimum RSSI for clients – Ubiquiti Networks Support and ...
shell-storm | Repository
The Guardian Project
scap-security-guide
Internet Speed Test | Fast.com
Iconsets
Open-Source Identity and Access Management | Evolveum
Cybersecurity Career | Cyber Security Roadmap | Cyber Skills - CSX
Protecting infrastructure secrets with Keywhiz – Square Corner Blog – Medium
Critical Stack, Inc
Computer Repair Services - Computer Repair Services Greenville, SC
Introducing Backpack: Our second-generation modular open switch
Code Climate
CYBATI - home
ESX 5.5 Cheat Sheet using esxcli – Part 1 | UnixGeek
VMware ESXi Patch Tracker - Help
Google Cloud Platform Blog: Save money, improve performance with new VM Rightsiz...
(IT) Information Technology Jobs & Careers | CompTIA IT Certifications
Understanding LDAP Security Processing | Ask the Directory Services Team
Using EPEL repos with Oracle Linux (Wim Coekaerts Blog)
Configuring mrepo to mirror ULN package channels (Oracle"s Linux Blog)
Live Upgrade Survival Guide (Solaris Tips)
IIS 7.5 – How to enable IIS Configuration Auditing? – WebTopics
Reusing Existing Configuration Scripts in PowerShell Desired State Configuration...
angr, a binary analysis framework
Inside My Home Rackspace Private Cloud, OpenStack Lab, Part 1: The Setup - The O...
10Gbps over 62.5µm Multimode Fiber
9 tools to help you with Java Performance Tuning
Fortinet Blog
Building a Vagrant Box from Start to Finish
Fault Tolerance on the Cheap Part I | via @codeship
Using Vagrant with Solaris 11
MonitoringScape
Learn C the Hard Way
Getting Started with Foreman: Part 2 | BeryJu.org
Getting Started with Foreman: Part 1 | BeryJu.org
beausanders.org: Home
Forget Comcast. Here’s The DIY Approach to Internet Access.
AutoVer - Automatic Versioning and Backup - Home
co-hc-5-the-time-to-address-medical-device-cybersecurity-is-now.pdf
Don"t ignore these early warning signs that your IT project is going awry | The ...
wissel.net :: Agile Outsourcing
Windows - Forcing Domain Group Policy | PeteNetLive
Hospital devices left vulnerable, leave patients at risk | CSO Online
What cyberinsurance gotchas companies must be ready for | CSO Online
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations - Kin...
NBlog - the NoticeBored blog: 28 days of awareness: day 10
CIO Jury: One-third of tech leaders had trouble finding cybersecurity staff last...
Organizations In 40 Countries Under "Invisible" Cyberattacks
Seth"s Blog: The two vocabularies (because there are two audiences)
carla schroder Linux - Google Search
Poverty Helps You Keep Technology Safe and Easy | FOSS Force
InfoSec Handlers Diary Blog - Ticketbleed vulnerability affects some f5 applianc...
CloudStats – Best Server Monitoring Tool for SaaS Businesses and Everyone Else
rtop - An Interactive Tool to Monitor Remote Linux Server Over SSH
vSphere 6.5 Seeks to Solve the Virtual Machine Encryption Conundrum
Security and Privacy Guidelines for the Internet of Things - Schneier on Securit...
HolisticInfoSec™: Aikido & HolisticInfoSec™
Clint Boessen"s Blog: Disable RC4 on Windows Servers
Alan"s Blog » Blog Archive » Another User Folder Security Reset Script
Hackers are getting smarter and more sophisticated, says cybersecurity expert
Proper tables with LaTeX – texblog
Security consultancy offers $1 million guarantee against breach-related costs
The next generation of cyber attacks -- PDoS, TDoS, and others
The secrets of top performing information security officers
Thinking Sysadmin | qstat -u aleonard -s z | Page 3
Deploy Offline Root CA in Windows 2012 R2 – SHA-2 Ready | Ammar Hasayen - Blog
PowerUp » Active Directory Security
Microsoft Word - 9b08E004.doc - STARS Information Systems Study.pdf
Use the DISM PowerShell cmdlets or SCCM to slipstream updates – 4sysops
Use DISM to slipstream updates – 4sysops
cyber_envscan_vol2_Apr2016.pdf
ResponsiveVoice.JS
Restyaboard - Trello like kanban board. Based on Restya platform | Restya
software validation fda
Rancher Labs | What"s New in RancherOS v0.5.0 | Rancher Labs
BeeWare - The IDEs of Python
My Top 10 Recommended Web Sites for Free PMP Exam Sample Questions - Project Acc...
Some ESXi CLI Commands – #vBrownBag
Big List of Best FREE PMP Certification Online Study Resources
PACS News
Between reality and cyberspace: Do you know the difference between Queue, MQ, ES...
Microsoft Warns of ZCryptor Ransomware with Self-Propagation Features
BashPitfalls - Greg"s Wiki
Mischa Taylor"s Coding Blog
Midnight Sailing
Fun with IBM Traveler and Java - By Ulrich Krause - eknori.de
DIY Wire Spooler with Clever Auto-Tensioning System | Hackaday
"Has She Gone Mental?" A Queen"s Gambit Leaves Chess World Baffled : The Two-Way...
bmon - A Powerful Network Bandwidth Monitoring and Debugging Tool for Linux
Hack the Gibson VM (CTF Challenge)
Five Books to Change Liberals" Minds - Bloomberg View
Five Books to Change Conservatives" Minds - Bloomberg View
3 open source, useful, powerful, and flexible wikis | Opensource.com
Record and Replay Terminal Session with asciinema on Debian Linux - LinuxConfig....
Asciinema
Everyone makes the same public speaking mistakes - Business Insider
Averting ransomware epidemics in corporate networks with Windows Defender ATP – ...
10 Essential Elements For Your Incident-Response Plan
Humana CIO shares 3 essential skills for building a customer-focused IT team | T...
Cybersecurity"s million dollar jobs | CSO Online
Using Packer with KVM | Midnight Sailing
From Security Perspective, the Quickest Way to Assess Your Web Application - sec...
Cyber Insurance Conundrum: Using CIS Critical Security Controls for Underwriting...
Open Security Research: What"s Really Open? Nmap Tips for an Accurate Port List
Open Security Research: Identifying Malware Traffic with Bro and the Collective ...
contagio
CSIRT Gadgets Foundation
Open Security Research: Application Whitelisting Programs, WinXP EoS, and HIPAA"...
OWASP Open Cyber Security Framework Project - OWASP
Open Security Research: An Open Cyber Security Framework
The Rise in Healthcare Cybercrime ~ Cyber Thoughts
Just How Secure is Healthcare? ~ Cyber Thoughts
An introduction to Performance Co Pilot, part 2. | Frits Hoogland Weblog
LPIC-1: A short overview – – Unixblogger –
DNS Hijacked? Slow? Setup Unbound on pfSense | b3n.org
What’s the actual cost to a business of a data breach? – Naked Security
average consolidated cost of a data breach had moved from $3.8m to $4m in the last year
Your Customers Don"t Care About Your Idea
Your Best Product Idea is Right In Front of You
The 5 Deadly Data Management Sins - Thomas LaRock
Why Build a Productized Service (Instead of Software)?
Vagrant Part 6 - Behind A Proxy Server
Vagrant Part 5 - Installing Your Software
Vagrant Part 4 - Install Boxstarter
Vagrant Part 3 - Provisioning With Chocolatey
Vagrant Part 2 - Provisioning Introduction
Vagrant - Fixing Opentable Basebox looking for Windows Plugin
Meld
How to create a nested ESXi 6.5 Template - ESX Virtualization
Best Practices for Running SQL Server Virtualized | Long White Virtual Clouds
Matt"s blog: Install and run a full functional VMware ESX Hypervisor within a KV...
Using VirtualBox host networks with vagrant
Deploying OpenStack with just two machines. The MaaS and Juju way. – Marco Ceppi
Working On Your Sales Funnel
Building Libvirt-vagrant Compatible Boxes | Linux Simba
Testing Secpod Saner Personal vulnerability scanner | Alexander V. Leonov
VM Remediation using external task tracking systems | Alexander V. Leonov
Zero to Validating a SaaS: A Step-by-Step Recap
Unbelievable ! 30 Linux TOP Command Examples With Screenshots
NetPi Turns Your Raspberry Pi Into a Network Analyzer Tool
Legal/ethical hacking. Information security.
Language Log
NSA-proof SSH « thefastestwaytobreakamachine
Edit your /etc/ssh/sshd_config:
Stop CryptoLocker (and copy-cat variants of this badware) before it ruins your d...
The Perils and Triumphs of Being a Geek: Installing ESXi in a QEMU-KVM virtual m...
ITIL Service Management: Service Management Document System
A Balanced Scorecard for the Cloud – Jim Kaskade
Instructions for Editing hosts.allow and hosts.deny Files
Dell_EMC_HC_MedDeviceSecurity_WP_final.pdf
2016_HoB_RDBMS_Licensing-White-Paper.pdf
Hector Marco Gisbert - Lecturer and Cyber Security Researcher
Raspberry Pi-based signage stack gets Snappy
Creating a good, secure Docker base image · Moritz Heiber
A modern and Open Source Web client for XMPP | Kaiwa
OpenStack Wiki in Short – A Quick Guide to Open Cloud | Cloudify
ITIL-v1.1.pdf
events.linuxfoundation.org/sites/events/files/slides/Introduction_to_vagrant_KVM...
DCM4CHE Support Forums: C-Store SCP Performance Question ...
DICOM @ OFFIS • View topic - Slow storescu/scp transfer
fossology-overview-20151109.1.pdf
EXFiLTRATED
Remove Extra Registry Settings from GPO - emtunc"s Blog
ELRepo : filesystem, graphics, hardware monitoring, network, sound and webcam dr...
Easy Appointment Scheduling With Easy!Appointments
HP Software Delivery Repository
OpenStack Docs: Example: Microsoft Windows image
Vagrant Part 1 - Easy Virtual Machine Management
DicomServer @ Medical Connections Ltd
DICOM is Easy: DICOM
David Clunie"s Blog: Image Sharing: Are we there yet? It seems not.
David Booth
David Rogers: Using Linux"s Logrotate to Manage Alert and Listener Log Files
Disk I/O | Performance Tuning on Linux
Federal-Whitepaper-Everything-You-Wanted-to-Know-about-DISA-STIGs.pdf
CloudU Certification
Bourne Shellscript
CLI-Ref-Guide-v3-2015-CAD.pdf
byronpate.com - Stop, Think, Execute
BSPG
The Art of Gilly Hathaway
Roundup
Easy Automated Web Application Testing with Hudson and Selenium - Treehouse Blog
VMware releases STIG Compliance App for FREE - VMware Security & Compliance Blog...
Java Performance Monitoring: 5 Open Source Tools You Should Know | Takipi Blog
Are ESXi Patches Cumulative - VMware vSphere Blog
VMware Security & Compliance Blog - - VMware Blogs
Chasing the bottleneck: True story about fighting thread contention in your code...
Building a Low-Power, High-Performance Server to Host Virtual Machines - Patshea...
HowTo Disable the “ZEROCONF” in Linux | Tips & Tricks
Odd Bits
NachoTech: How to find all the iLO’s on your network
ICE9 Blog: BLE Fun With Ubertooth: Sniffing Bluetooth Smart and Cracking Its Cry...
Logging Cowrie logs to the ELK stack
7 Stellar IT Management Podcasts - Capterra Blog
9 Docker recipes for Java EE Applications - Tech Tip #80
vCheck (Daily Report) | Virtu-Al.Net
ghettoVCB VIB & offline bundle for ESXi | virtuallyGhetto
Find A Doctor | Free Doctor Reviews & Ratings | Vitals.com | Rate MDs & Review D...
How to patch ESXi 5 without vCenter | ESX Virtualization
vCenter Appliance 6.0 - Simplified Scripted Installation - ESX Virtualization
Blog Series: ESXi 5 STIG – ESXi Server SSH Daemon | VM Field Tips
How to patch VMware ESXi 5 host using command line
Get Giver To Work In Ubuntu 11.10 And 11.04 [Quick Tip] ~ Web Upd8: Ubuntu / Lin...
Try VMware Workstation Pro, Run Linux and Windows in a Virtual Machine
Home - VulnerabilityAssessment.co.uk
10 gadgets every white hat hacker needs in their toolkit
Proxmark3
`top` command cheat sheet
Using the Shikra to Attack Embedded Systems: Getting Started - Xipiter
Shikra
Howto: Create a nested lab
Yosemite Project | Mission: Semantic interoperability of all structured healthca...
Clonezilla Live on PXE server
Troubleshooting High I/O Wait in Linux
[bc-log]: A Linux Systems Administration Blog
So You Want an SSL Certificate? A Pragmatic Handbook - Artsy Engineering
The secret world of microwave networks | Ars Technica
No-Cook Overnight Oatmeal Recipe - Allrecipes.com
Packer – automating virtual machine image creation
Chef cookbook implementation of the CIS CentOS and Ubuntu Linux 6 Benchmark
InfoSec Handlers Diary Blog - Packet Analysis - Where do you start?
How to Check Database Availability from the Application Tier | SQL Server Custom...
Solving SQL Connectivity issues: A new guided walk through just got published – ...
Migrating your TFS to the Cloud – Microsoft Faculty Connection
FreeNas Podcatcher: Bashpodder | Amado Martinez
US Army Bug Bounty Program Fixes 118 Flaws - Dark Reading
Securing SAP Clouds: Application Security
How to encrypt VirtualBox VMs - TechRepublic
Shadow Regulation Around the World | Electronic Frontier Foundation
DBaaS Performance | Oracle Scratchpad
Cyber Security Attackers Toolkit – What You Need to Know – Enterprise Mobility a...
Beginner Guide of mysql Penetration Testing
Back to Basics: Focus on the First Six CIS Critical Security Controls - basics-f...
How DevOps became mainstream in the enterprise
SharePoint Crawl log and the mysterious SearchID… – Blog On Search
AWS for VMware Admins - London VMUG Slide Deck - Tekhead.it
Welcome to the Adafruit CircuitPython Beta! « Adafruit Industries – Makers, hack...
MalDuino — Open Source BadUSB | Hackaday
DeployHappiness | Quick Tip: Add Computer to Group – GPUpdate without Restart
klist -li 0x3e7 purge
Real World Computing: Getting Contacts (Not Users) out of Your Notes/Domino NAB ...
For those missing Lotusphere or IBM Connect right now, years of pictures | IdoNo...
ReFS cluster size with Veeam Backup & Replication: 64KB or 4KB? - Virtual to the...
Muxtronics 12V Powerbank
Linked - Deutsche Bank Bans Text Messages, WhatsApp on Company Phones
Storing PowerShell Credentials in JSON
KDEConnect - KDE Community Wiki
Errata Security: The command-line, for cybersec
Smashing Security Podcast
Minimizing Legal Risk When Using Cybersecurity Scanning Tools - minimizing-legal...
Some useful forensics tools for your forensics investigation by AdminAdmin - dig...
Press Releases - News | Kroll
My Take on Application Whitelisting
Set Date and Time for Each Command You Execute in Bash History
Waveconverter
Data breaches up by 40 percent in 2016
Are you doing your part to thwart DDoS attacks?
EC2Instances.info – A Handy Interactive Guide to AWS EC2 Instance Sizing and Pri...
Dangerous assumptions that put enterprises at risk | CSO Online
Building a Magic Mirror; Nifty Opto-Isolator Tricks | TroyDenton.ca
An introduction to PCP / Performance Co Pilot on Oracle Linux | Frits Hoogland W...
FDA Recommendations on Medical-Device Cybersecurity - Schneier on Security
A visual map of emerging cybersecurity trends - TechRepublic
How much is a data breach going to cost you? | CSO Online
Why you"re not investing enough in IT security | CSO Online
Join an Additional Ubuntu DC to Samba4 AD DC for FailOver Replication - Part 5
Install Arch Linux VirtualBox
10 open source task management and time tracking applications for Android | Open...
4 key IT trends for CIOs in 2017 | The Enterprisers Project
The Most Dangerous User Right You (Probably) Have Never Heard Of – harmj0y
Trying to become another user on Linux/getting error logging to server – su: can...
Cisco Licence Differences LAN-Lite / LAN Base / IP BASE / IP Services | PeteNetL...
MSSQL user can’t connect until password change | Annoying stuff I figured out (o...
Technical notes, my online memory: kubectl Kubernetes Cheat Sheet
Creating a GitHub Repository from PowerShell
Electronic Discovery Law Throughout the United States
Did a Russian Physicist Invent Radio? | Hackaday
Tickets"n"patches
Tickets"n"patches
Res Publica Non Dominetur – カルマン » Blog Archive » LiPo Batteries Hacking and ref...
How to Easily Upgrade Ubuntu"s Linux Kernel With Ukuu
Tracking Planes with an ESP8266 | Hackaday
ESP8266
Clang-format for consistent coding style | Opensource.com
SSWUG.ORG - Your IT Professional Source For Answers
wistar packer
SenateCaller
check_ioc
Wistar
21 Cyber Security Blogs that Keep IT Pros in the Know
index of /
getAbstract: The world of business, summarized.
KVM - VM Templates - EverythingShouldBeVirtual
Ubuntu 16.04 / Debian 8: Run PXE boot server for automated install - Narrow Esca...
Using Key Vault Secrets in PowerShell – Practical Development
Stack Exchange Security Blog
Seven Weeks
Everyday Retrospective - Agile Retrospective Resource Wiki
How to Increase the size of a Linux LVM by adding a new disk | RootUsers
DAG: mrepo: Yum/Apt repository mirroring (fka yam)
zfs terms
Ginkgo CADx | Ginkgo CADx, Open Source DICOM CADx environment
OpenSolaris Home Server: ZFS and USB Disks (Constantin"s Blooog)
ZFS: You should use mirror vdevs, not RAIDZ. | JRS Systems: the blog
lowRISC · lowRISC
How to patch an ESXi host through a USB flash drive | IT vlab
PowerShell: Report expiring certificates « BUG-MAN Ltd.
Win-Fu Official Blog: Every Windows 10 in-place Upgrade (even with SCCM) is a SE...
Win-Fu Official Blog: Every Windows 10 in-place Upgrade is a SEVERE Security ris...
DNS short name lookup fails on Ubiquiti EdgeRouter Lite"s latest firmware v1.9.1...
What Does the Windows 10 "Creators Update" Do for Security?
How to Trace Execution of Commands in Shell Script with Shell Tracing
Uncovering Indicators of Compromise (IoC) Using PowerShell, Event Logs and a Tra...
Surveillance State “at home” Edition | Jethro Carr
InfoSec Handlers Diary Blog - py2exe Decompiling - Part 1
Photocopier Security - Schneier on Security
Evil Tester: Lessons Learned from Arnold Schwarzenegger Applied to Software Test...
5 ethics principles big data analysts must follow - TechRepublic
5 Reasons to Avoid Smart Assistants If You Value Your Privacy
SQL Server Performance Dashboard Reports unleashed for Enterprise Monitoring !!!...
Open Source Canvas: A business plan for your open source project | Opensource.co...
Open Source Canvas
Open Network Linux
SST - ESP8266 Smart Thermostat WiFi IoT ready • Hackaday.io
NBlog - the NoticeBored blog: Internet security awareness
HolisticInfoSec: The DFIR Hierarchy of Needs & Critical Security Controls
Getting to Know the Windows Server 2016 Essentials Dashboard - We Got Served
Nutanix Performance with Oracle SLOB on All Flash Nodes | Long White Virtual Clo...
Creating a Flowchart with TikZ and LaTeX | Connor Johnson
Aaron Toponce : ZFS Administration, Part I- VDEVs
ZFS - ArchWiki
Flowchart | TikZ example
Guilt-Free Banana Pudding (No Dairy or Gluten) | Paleo Grubs
Cheat sheet: which 4G LTE bands do AT&T, Verizon, T-Mobile and Sprint use in the...
An ITIL guide that is not boring
ITIL Certification Guide: Overview And Career Paths
ZFS Tutorials : Creating ZFS pools and file systems
ITIL Certification
2016"s hacks, attacks and security blunders
Welcome To The Resource Center | IDERA
UtahSysAdmin.com | Configuring Nagios Plugins & NRPE on Solaris 10
Open Source Forensic Tools… which means it’s Free – H-11 Digital Forensics
Tools - ForensicsWiki
mubix/infosec_newbie.md
Open Source | Smarter Forensics
https://github.com/binarymist/Free-Security-eBooks
The most important JVM memory tuning parameter- and how to ace it.
Troubleshooting performance issues in Linux - RimuHosting
How to Tune Java Garbage Collection | CUBRID Blog
Everything I Ever Learned About JVM Performance Tuning @Twitter
Linux - Performance Issues Troubleshooting - UnixArena
Slow Server? This is the Flow Chart You"re Looking For
Windows Command Line Sheet - windows_command_line_sheet_v1.pdf
Test-Kitchen & Serverspec with Windows guests - Dreaming in DevOps
Getting started with Serverspec | Damyan"s Blog
fsck-convenient
Nick"s Tech Blog | Understanding case sensitivity in Windows: obcaseinsensitive,...
Testing Windows Infrastructure with ServerSpec | Shaw Innes
How I Carried The Message To Garcia - Foundations Magazine
Index of /code/nipl-tools
FH Consumer Cost Lookup
UNIX Shell Skills « WordPress Codex
Nessus Training - Session 2 - Scanning Handout - nessus2.pdf
serverspec the new best way to learn and audit your infrastructure
Downloading in bulk using wget | Internet Archive Blogs
Truncate a SharePoint database log file – SharePoint Steve
Upgrade Active Directory Server 2016 from Server 2012 R2 | JDeployment
reporting the nested errors in PowerShell – Sergey Babkin
expect in PowerShell – Sergey Babkin
How to Properly Wrap All Your Cables so They Don"t Turn Into a Tangled Mess
Errata Security: IoT saves lives but infosec wants to change that
5 Ways to Penetration Testing of HTTP Protocol (Verb Tempering)
My Journey to Improve Disk Performance on the Raspberry Pi | Linux-toys.com
diff in PowerShell – Sergey Babkin
how to install a new Windows service – Sergey Babkin
Setting up the CredSSP access for multi-hop – Sergey Babkin
CredSSP
InfoSec Handlers Diary Blog - Using daemonlogger as a Software Tap
/usr/local/sbin/daemonlogger -i eth0 -o eth2 -d
How to install malware detection and antivirus on CentOS 7 - TechRepublic
SQL Server Disk Allocation Size – SharePoint Steve
How to set up a manual threat intelligence lifecycle program
Magic Mirror 2
Dark matter scientist Vera Rubin dies at 88
Recent Raspberry Pi projects to add to your To Do list | Opensource.com
200 Years of The Stirling Engine | Hackaday
Vera Rubin, Astrophysicist Who Confirmed Existence Of Dark Matter, Dies At 88 : ...
OSMC
Wordpress Penetration Testing using Symposium Plugin SQL Injection
CIS Critical Security Controls
NBlog - the NoticeBored blog: CIS Critical Security Controls [LONG]
IsecT infosec consulting
NBlog - the NoticeBored blog: You know you"re a geek if ...
PRAGMATIC
ISO27k infosec management standards
sysadvent: Day 24 - Migrating from mrepo to reposync
Alan"s Blog » Blog Archive » Get COM Object Constants with PowerShell
Importing and mounting ZFS pools at boot time on Fedora servers
The importance of cleaning up disk headers after testing
mdadm –zero-superblock
Web Testing with PowerShell
Small-scale honeynet with Raspberry Pi
Sysadmins and risk-management - SysAdmin1138 Expounds
Securing Linux with kernel hardening features
Error inside a LXC container: bash: fork: retry: No child processes – – Unixblog...
MalwareJake: Encryption of healthcare SAN/NAS
Investments In Security Operations Centers Are Paying Off, Study Finds - Dark Re...
Major Cyberattacks On Healthcare Grew 63% In 2016
Cybersecurity is a chess marathon with hackers: Carl Herberger | CSO Online
contagio: 16,800 clean and 11,960 malicious files for signature testing and rese...
Search And Collect
Using Ceph as Block Device on CentOS 7
Open Source ERP and CRM | Odoo
$5 DigitalOcean, Vultr & Lightsail Benchmarks | b3n.org
Pressure Cooking Boneless Skinless Chicken Breasts Recipe | Yummly
vSAN in cost effective independent environments
Unsealed suit targets law firm for alleged lax cybersecurity
New version of drivers harvester copies all OEM drivers to separate folder – Ale...
SQL Server on Linux, aka project Helsinki: Story behind the idea – Slava Oks"s W...
The numbers don’t lie. 9 facts that prove IT Certification works. – Microsoft Pa...
How Has Amazon Managed To Make Hackers Love Alexa? | Hackaday
Running Ansible in a Vagrant-Controlled Virtual Machine - Building Network Autom...
guestwlan
Samy Kamkar Illustrates How to Be a Hardware Hacker | Hackaday
SamyKamkar
Open G Apps
C:OUTPUTGARCIA.DVI - Message to Garcia.pdf
Vulners - Vulnerability Data Base
Stop CEO/CFO Domain Spear Phishing | Linux Included
KidsWifi | Protect your kids online
tikzpgfmanual.pdf
My Take on an Azure Open Source Cross-Platform DevOps Toolkit–Part 2 – All thing...
How to Build You Own Personal Jenkins CI Server - DZone DevOps
How to provision Dockerized hosts with Docker Machine from Linux Mint 18, 18.1 |...
InfoSec Handlers Diary Blog - Internet Storm Center Diary 2016-12-18
American Consumer Council- A Non-Profit Consumer Education Organization
Using docker-compose for multi Docker container solutions | Marco Franssen
Speed-Test Your Toys with Die-Cast Drag Strip | Hackaday
Power BI – 12 Days of Dashboards – Sam Lester – SQL Server & BI Premier Field En...
VMware VCSA 6.5 Active-Passive Setup With Simple Configuration - [LAB] - ESX Vir...
Digital Transformation through IoT
BizTalk Health Monitor v4.0 released! – BizTalkHealthMonitor
Using Non-default Ports for SQL Server - Thomas LaRock
Installing Ansible 2.2 on Ubuntu 16.04 · Scott"s Weblog · The weblog of an IT pr...
DSHR"s Blog: The Medium-Term Prospects for Long-Term Storage Systems
A How-To in Homebrew Design, Fab, and Assembly with Structural Framing Systems |...
IT heads lack the confidence to fight security threats
IT leaders look to the cloud for backup and recovery
openDCIM - Open Source Data Center Infrastructure Management
5 simple tips for building your first Docker image with Java - O"Reilly Media
Encrypt Password In CTX1 Encoding With PowerShell | chentiangemalc
Ansible snippet | panticz.de
Bluetooth Turns 5 | Hackaday
10 Basic Python Examples That Will Help You Learn Fast
From the Canyon Edge: Ubiquiti Networks UniFi Controller in an Ubuntu LXD Machin...
How do security professionals study threat actors, & why do we do it? | Hacks4Pa...
SSH Reverse Tunnelling Tips & Tricks | Midnight Sailing
Useful Virtual Box Virtual Machine Script - Blog - Blog - IDERA Community
Testing Solaris IPMP failover | setaOffice
cybersecurity_report.pdf
I just connected to a terminalmserver - Fun with virtualizationFun with virtuali...
InfoSec Handlers Diary Blog - 5 Questions to Ask your IoT Vendors; But Do Not Ex...
This easy presentation software lets students focus on content, not design – Mic...
The Frustrated DBA | Late Night Oracle Blog
Building a Nested ESXi Lab For Your Company | Virtual Insanity
Rapidly Clone Whole Test/Dev/Lab Environments with vRA and NSX | Virtual Insanit...
Packer.io machine building and provisioning part 2 | Marco Franssen
Packer.io machine building and provisioning part 1 | Marco Franssen
Backup performance of VMware VVOLs - Virtual to the Core
Monitor a Ceph cluster with Ceph Dash - Virtual to the Core
Netflix runs 100% on AWS now - Virtual to the Core
Share your Veeam code on VeeamHub! - Virtual to the Core
Configuring Windows machines for Ansible - Virtual to the Core
Increase the performance of your Veeam backups in network mode - Virtual to the ...
The Kid Should See This.
My new helper Ansible – – Unixblogger –
Home - TelekomCLOUD
Contribution to OpenSCAP with Jenkins | Zbynek"s blog
How much memory is truly used by my Oracle instance? | Frits Hoogland Weblog
Zbynek"s blog | Just another WordPress site
RSS
inoug16_misconfig_default.pdf
LaTeX Templates » Cheatsheet
security-scripts
Checklist Service Design Package SDP - IT Process Wiki
www.oaktable.net
Using Ansible for executing Oracle DBA tasks. | Frits Hoogland Weblog
The Twelve-Factor App
Cyberseek
Service Design Package (SDP) Template | My ITIL Journey
CryptoLicensing For .Net - Add licensing, copy-protection and activation to C# a...
Moving Faster with Packer to Build Images
Connecting to a Remote Serial Port over TCP/IP
Make RS232 Serial Devices Accessible via Ethernet | Philipp"s Computing Blog
OpenSlava 2016
Eramba - Open-Source IT GRC
Tech DebugPacker vmware-iso builder on ESXi without DHCP - Tech Debug
PSScriptAnalyzer
OWASP ModSecurity Core Rule Set (CRS)
Data Center Map
PF for Solaris (Solaris Firewall)
Creating Windows 10 Visual Studio 2015 VirtualBox Vagrant box using Packer
On managing large documents – texblog
TreeSheets
Configure HP ILO directly on ESXi server - Virtual to the Core
Packer – automating virtual machine image creation
Free Ransomware Decryption Tools | Unlock Your Files | Avast
How to install or upgrade SAP Systems to SQL Server 2016 *updated* | Running SAP...
Evil Tester: Taking Software Testing More Seriously By Using Humour
SQL Server 2016 SP1: Know your limits – MSSQL Tiger Team
Secure IoT Through Oversight, Open Source and Open Standards | Security content ...
How to setup rsyslog for Centralized Log Management
25 Best Habits to Have in Life
At Long Last, Linux Gets Dynamic Tracing - The New Stack
How To Check Laptop Battery Status In Terminal In Linux - OSTechNix
upower -i `upower -e | grep "BAT"`
Why You Should Have a Personal CI Server - DZone DevOps
360 GSP Blog Awards - Top 50 Blogs in IT - 360 GSP Blog
Bare metal and Virtual Machine Provisioning through Foreman Server
Manage Samba4 AD Domain Controller DNS and Group Policy from Windows - Part 4
Manage Samba4 Active Directory Infrastructure from Windows10 via RSAT - Part 3
VMware vSphere 6.5 Configuration Maximums - ESX Virtualization
Automating the build of your vSphere 6.5 home lab - Virtu-Al.Net
An Amateur Radio Repeater Using An RTL-SDR And A Raspberry Pi | Hackaday
Taking It To Another Level: Making 3.3V Speak with 5V | Hackaday
Convert Cabinet Shelves into Pull Out Drawers - YouTube
How to Install Gitlab on Debian 8 (Jessie)
httpstat - A Curl Statistics Tool to Check Website Performance
OpenStack Day Canada Recap – DiscoPosse.com
Install Security Patches or Updates Automatically on CentOS and RHEL
How to Manage Samba4 AD Infrastructure from Linux Command Line - Part 2
Create an Active Directory Infrastructure with Samba4 on Ubuntu - Part 1
The Future of the DBA - Thomas LaRock
A Network of Sorrows: Small Adversaries and Small Allies - Quinn Norton | Open T...
BITAG
DSHR"s Blog: Talks at the Library of Congress Storage Architecture Meeting
San Francisco MUNI hacker was hacked
Seth"s Blog: Hobson"s choice, Occam"s razor, Wheeler"s which and the way we deci...
AWS Certified Developer Associate (CDA) Exam Experience & Tips - Tekhead.it
The Technology chronicle!!!: Windows Server 2016 - Introducing Nano Server
AI is the Future of Project Management – Part II
AI is the Future – and the Present – of Project Management
Photon Controller v1.1 and vSAN interoperability - CormacHogan.com
Reaction: Issue a press release - "net work
CERT warning: Windows 10 is less secure than Windows 7 with EMET
How to keep track of your Windows 10 update history
Kaspersky: DDoS attacks are a smokescreen
North American businesses suffer twice as many cyber attacks
Many users don"t want to deal with breached businesses
The lure of keygens helps spread Gatak malware through the enterprise and health...
Using Ansible Playbooks with Cisco VIRL - Building Network Automation Solutions
What are the benefits of DevOps?
Why cloud? Justification for non-techies
A VMware guy’s perspective on containers | mwpreston.net
How to create a USB media with ESXi 6.5 Installation - ESX Virtualization
How to remap F2 in Supermicro iKVM Remote Console to get to VMware ESXi "Customi...
nuzzel.com
Go Beyond Local with Secure Shell | Linux.com | The source for Linux information
Presentation - NetScaler goes cloud | sepago
Shadow IT– Learn how to get control now – Enterprise Mobility and Security Blog
3 Tips for Keeping Your Local Git Repositories Happy - Wahl Network
Unix ports for OS/2 and eComStation - Unix Ports for OS/2 & eCS
Nakivo Backup Copy - Why would you use it? - ESX Virtualization
Personal Finance Blog: MoneyPantry
How to Upgrade ESXi 6.0 to 6.5 via CLI [On Line] - ESX Virtualization
VMware vSAN: 2016 Edition – vNinja.net
Making an Impact with Local Security Conferences – Chris Sanders
Using File Server Resource Manager to Screen for Ransomware
Anti-Ransomware File Server Resource Manager Filters
Creamy Chicken Bacon Pasta Recipe | TipHero
How Analysts Approach Investigations – Chris Sanders
Three Useful SOC Dashboards – Chris Sanders
The Learning Toolbox
Adapting the World to Her -Jake | Memories for Rebecca
Grace Hopper, Margaret Hamilton, Richard Garwin Named for Medal of Freedom | Hac...
Creating A PCB In Everything: KiCad, Part 1 | Hackaday
Exponential change in IT requires continuous improvement – Here"s how to get the...
Yes, You Can Exercise Right Now! Anywhere
Why you should never work longer than 90 minutes at a time - Business Insider
How to easily update your VMware vCenter Server Appliance to vCSA 6.5 (coming so...
How to easily update your VMware Hypervisor to ESXi 6.5 (coming soon) | TinkerTr...
Errata Security: DoD address space: it"s not a conspiracy
joeware – never stop exploring… :) » Blog Archive » Hey joe, How Do I Quickly Ge...
adfind -gcb -sc dcdmp -dsq | adfind -nodn dnshostname operatingsystem operatingsystemservicepack –jtsv2
The Tiny Internet Project, Part II | Linux Journal
The Tiny Internet Project, Part I | Linux Journal
5 Fun Raspberry Pi Projects: Getting Started | Linux.com | The source for Linux ...
Apollo code developer Margaret Hamilton receives Presidential Medal of Freedom |...
Obama honors code pioneers Grace Hopper and Margaret Hamilton
Setting yourself up for success with Veeam Pre-Job Scripts | mwpreston.net
The Lost Civilization of Dial-Up Bulletin Board Systems - The Atlantic
Neofetch - Shows Linux System Information with Distribution Logo
Andy"s House O" Blog: #employed
Analyzing SQL Server Buffer Pool with TreeMaps in PowerShell | SQLvariations: SQ...
FinanceProfessor.com: Podcast episodes for economics classes
Reaction: DNS is Part of the Stack - "net work
Samy Kamkar: PoisonTap - exploiting locked computers over USB
Vembu Universal Explorer - Free Tool - ESX Virtualization
PechaKucha - Wikipedia
PechaKucha
How I nearly almost saved the Internet, starring afl-fuzz and dnsmasq » SkullSec...
grance-tim-slides.pdf
Default Protections for Popular Software
Why DNS is awesome and why you should love it » SkullSecurity
Building Better PowerShell Dashboards | Tim Bolton - MCITP - MCTS
Tim Bolton - MCITP - MCTS | Sharing information about IT and things I have broke...
PowerShell Magazine » “PowerShell Security Special”
About | BatchPatch - The Ultimate Windows Update Tool
Michigan CyberSecurity - Michigan Cyber Civilian Corps
LaTeX Templates - ShareLaTeX, Online LaTeX Editor
Assembling a Container Security Program: Container Validation
Assembling a Container Security Program: Monitoring and Auditing
Assembling a Container Security Program: Securing the Build
Dynamic Security Assessment: The Limitations of Security Testing
Test-Playground – Kitchen DSC for PowerShell – Tech, Automation, Life
SQL Server Management Tools on Windows and Other Platforms at #SQLSummit | SQLva...
Uncover insider threats, blind spots in your network with Advanced Threat Analyt...
PowerShell for SSRS is Here! | SQLvariations: SQL Server, a little PowerShell, m...
DIY Baby Monitor | Antibore"s Blog
Safely storing credentials and other things with PowerShell | Tim Bolton - MCITP...
Getting started with Windows Server Containers – Django Example – Tech, Automati...
scap_steveakers.pdf
Computers & Security - Journal - Elsevier
Stephen Walker Obituary - Severna Park, MD | Baltimore Sun
Cyber Deception Technology Market to Generate Revenue over USD 1 Billion Forecas...
PXELINUX for booting of ISO images « HIGAKNOWIT.COM
Ubuntu 12.04 PXE Live CD Server | Core Dump
PXE Boot any ISO Image | Core Dump
Life-Without-DevStack-OpenStack-Development-With-OSA-1-.pdf
PXEInstallMultiDistro - Community Ubuntu Documentation
Association of Information Technology Professionals -- AITP
Quote Investigator
Makhaon - professional solutions for medical visualisation
A Quick Intro Screen on Linux – DiscoPosse.com
Using Linux auditing to observe program executions and file accesses
GitBook · Writing made easy
My Life in the Connector Zoo | Hackaday
Talk Recap: Holistic Security for OpenStack Clouds - major.io
5 Essential Tools To Secure Your Business from Cyberattacks - Business Opportuni...
Success is not a linear path – NoDaysOff Magazine
Technical notes, my online memory: Vagrant, Packer, and Boxcutter FTW: Create a ...
Installing and Running a Headless Virtualization Server | Linux Journal
Maple-Roasted Sweet Potatoes Recipe - EatingWell.com
Baked Cheeseburgers | Healthy Recipes
How to structure sites in your SharePoint Intranet - SharePoint Maven
Internet of Things (IoT) Scanner - BullGuard
Blocking countries via iptables // Room362
Errata Security: Configuring Raspberry Pi as a router
Jim Collins - Articles - Hedgehog Concept in the Business Sectors
US-CCU Cyber-Security Matrix
SANS Penetration Testing | Scapy Cheat Sheet from SANS SEC560 | SANS Institute
Debian: installing a PXE server on Wheezy — Hackzine Wiki
Create Windows Vagrant Box(s) – Aslan Brooke"s Blog
Simple Samba Shares in Debian - Thomas-Krenn-Wiki
Tickets"n"patches
9.1. Building smart diagrams
InfoSec Handlers Diary Blog - ISC Briefing: Large DDoS Attack Against Dyn
ICS Cybersecurity Conference
TOra is an open source SQL IDE for Oracle, MySQL and PostgreSQL dbs
EM4100 RFID Cloner kit | KBEmbedded
merit | Connecting Organizations, Building Communities
Bruteforcing Windows over SMB: Tips and Tricks » SkullSecurity
DPAP | Defense Acquisition Regulations System | DFARS/PGI
Moderncv Banking - LaTeX Template - ShareLaTeX, Online LaTeX Editor
Creating Mind Maps Using TikZ - ShareLaTeX, Online LaTeX Editor
DCM4CHEE PACS Migration made easy in couple of hours. | Rady"s Inspirations
DeJarnette | HL7, DICOM, XDS, IHE, VNA, Vendor Neutral Archive, Data Migration
Michigan Cyber Civilian Corps
LaTeX KOMA template
Do you really need one year old Logs and Traces for your Oracle Database? | Cara...
retention
How To : Setup a PXE Boot Server on Debian Part 1 » The Rantings and Ravings of ...
Net booting a Linux workstation
Pi 3 booting part II: Ethernet - Raspberry Pi
Research.
Setting Up A PXE Install Server For Multiple Linux Distributions With Ubuntu Edg...
PXE Boot server
PXEBootInstall - Debian Wiki
Setting up a "PXE Network Boot Server" for Multiple Linux Distribution Installat...
blog.wakatta.jp
Ubuntu 16.04 / Debian 8: Run PXE boot server for automated install - Narrow Esca...
Carolina Advanced Digital: Networking, WiFi & Security
Quick Sequence Diagram Editor download | SourceForge.net
File Integrity Monitoring With AIDE - General Discussion Forum - General Discuss...
Cyber Exercise Playbook - pr_14-3929-cyber-exercise-playbook.pdf
Introducing CNAME Flattening: RFC-Compliant CNAMEs at a Domain"s Root
Remediation through SCAP - Simplicity is a form of art...
SCAP Workbench | OpenSCAP portal
SIMILE Widgets
TheFrugalComputerGuy.com
PechaKucha 20x20
SQL Server 2012 Master Query | Chris Blogs
Microsoft PowerPoint - CON8015_Compliance_EDG Final.pptx - con8015-compliance-ed...
Audit Rules
How many open FTP servers are there?
Information technology | NIST
eSCAPe
Upgrade your SSH keys! · blog.g3rt.nl
WMI vs. WMI: Monitoring for Malicious Activity « Threat Research Blog | FireEye ...
EECS 588 - Reading List
J. Alex Halderman
Windows Update & WSUS Patch Management Software Tools | BatchPatch
wmic useraccounts
IOActive Labs Research: Multiple Vulnerabilities in BHU WiFi “uRouter”
Network Weathermap – Open Source Network Visualisation
Tips & Tricks: YOU HAVE LOST ACCESS TO SQL SERVER. NOW WHAT? – All things Data R...
Local Update Publisher
CANES 101 Brief - 1.25.12_AFCEA_Kit_VIII.pdf
Canes_Supplement_Defense_Daily.pdf
CANES - Consolidated Afloat Networks and Enterprise Services
DIACAP_Slick_Sheet.pdf
ATO meaning | DOD Joint Acronyms & Abbreviations Dictionary
Spotting the Adversary With Windows Event Log Monitoring
WuInstall
The 5 Best Hacks for Your Amazon Dash Buttons
Bluetooth 5: What"s New and What"s Good?
How to Estimate Your Vocabulary Using a Python Script and the Scrabble Word List...
Show us your ugly repair - Page 1
Chemical Formulas 101 | Hackaday
The Best of the Z-Wave Door and Window Sensors - DarwinsDen.com
SNMPPLUX | Pentura Labs"s Blog
Updating Dell PowerEdge servers via bootable media / ISO | Dell US
Building a mail server with Puppet | Jethro Carr
8 Best Sites to Help Your Kids Learn About Money
The origins of on-call work - SysAdmin1138 Expounds
BlackHat/Def Con/BSides Talk Picks for 2016 // Room362
Home - National Association of State Technology Directors
SharePoint Intranet Homepage Best Practices - SharePoint Maven
Moving a Static Site to S3 Before My Girlfriend Got Out of the Shower
The Enhanced SCAP Editor (eSCAPe) and Libraries - Automation_Content_Tutorial-eS...
MDL
DSHR"s Blog: Brief Talk at the Storage Architecture Meeting
The FBI recommends you cover your laptop"s webcam, for good reason
Docker - Creating An Alpine Image With Ansible Installed - EverythingShouldBeVir...
System emulation using QEMU
Introducing 411: A new open source framework for handling alerting - Code as Cra...
CozyRoc | SQL Server 2005 Integration Services (SSIS) information, products, fre...
Life On Contract: Estimating Project Time | Hackaday
Snagging creds from locked machines · Room362
Cohesity 3.0 – One platform for all your secondary storage! | mwpreston.net
Why ransomware should be feared by companies of all sizes
Karosium: SMBusb - Open-source USB SMBus interface
smbusb
Whats in my PowerShell Profile | SQLvariations: SQL Server, a little PowerShell,...
Poor PAC File Performance–A WireShark Example | chentiangemalc
Wine Reviews : WineTricks has seen a massive amount of improvements this year
Installing BlackArch Linux on a Raspberry Pi | FOSS Force
Great Feats of Deployment: OpenStack in 90 Minutes - This is Hyper-Awesome
Introducing Advanced Threat Analytics v 1.7! – Enterprise Mobility and Security ...
MDADM: Convert RAID5 to RAID10 - Walery Wysotsky Site
OpenWISP Project - What is OpenWISP?
Unifi competitor?
Atlanta.mdf
RACI Matrix
Overnight, No-Cook Refrigerator Oatmeal
Vulnerable By Design ~ VulnHub
oot2root/CTF challenge which attempts to showcase a real-world scenario, with plenty of twists and trolls along the way.
binwalk.org
Insider Threat
Center for Development of Security Excellence (CDSE)
Investment Management, Online Financial Advisor | Wealthfront
ToolsWatch.org – The Hackers Arsenal Tools Portal » AutoNessus – Python Script t...
Corner Office from Marketplace
Real World Computing: Looking at Cloud Licensing - Microsoft, IBM and Google
Coffee Shop DevOps: How to use feedback loops to get smarter | Opensource.com
How to Install Windows PowerShell in Linux - OSTechNix
Turtl: Secure, Open Source Evernote Alternative ~ Web Upd8: Ubuntu / Linux blog
Laptop pioneer John Ellenby dies
John Ellenby
Replicating SAN on openSUSE with VAAI - Blah, Cloud.
Do It Yourself Gadgets: USB LED indicator Power Bank from Laptop Battery
Wikibon.com | Wikibon.com
OpenHAB & Z-Wave - Home Automation For Geeks
Useful SystemD commands (hints for systemctl or systemctl vs chkconfig and servi...
systemctl enable
How Analog Design Is Different Than Digital | Technogog
Crowdsourcing Community Knowledge with CloudPhysics - WoodITWork.com
product-lifecycle-matrix.pdf
How to verify your HIPAA compliance
History Of The Diode | Hackaday
How to Encrypt and Decrypt Files and Directories Using Tar and OpenSSL
Easily Correct a Typo of Previous Command Using Carat (^) Symbol
FOG Project
How to Mount Remote Linux Filesystem or Directory Using SSHFS Over SSH
OpenWISP Project - Homepage
CloudFlare Dynamic DNS Update Script (cf-ddns.sh) – vNinja.net
Dynamic DNS Requirements – vNinja.net
Using CloudFlare for Dynamic DNS – vNinja.net
Nakivo – Backup and Replication for your VMs – A review! | mwpreston.net
What is The Cheapest VMware vSphere License? - ESX Virtualization
Clint Boessen"s Blog: The Danger of the Local Administrator Account
Accounts: Administrator account status
6 ways to build a super secure document library in SharePoint - SharePoint Maven
Best way to protect against Ransomware - Backups and Snapshots - kossboss
How the CORD Project Will Change the Economics of Broadband | Linux.com | The so...
6 ways to save on food costs during road trips with family - Bargaineering
Total System Backup and Recall with Déjà Dup | Linux.com | The source for Linux ...
K.C."s Garage: TOWL - Telemetry over Opportunistic WiFi Links
Veramine
US reportedly elevates the role of Cyber Command
How to monitor DHCP server usage - OSTechNix
InfoSec Handlers Diary Blog - Stop calling it a ransomware "attack"
Wink Hub integration with OpenHAB for local control | electronic hamsters
OpenHAB on Raspberry Pi
Seth"s Blog: Scientist, Engineer and Operations Manager
Are You Spending Too Much on "Normal" Expenses?
How to configure pfSense as multi wan (DUAL WAN) load balance failover router
How to Use "apt-fast" to Speed Up apt-get/apt Package Downloads Using Multiple M...
Learn Python Control Flow and Loops to Write and Tune Shell Scripts - Part 2
Debian / Ubuntu mass dist-upgrade with Ansible (with fallback and logging) | pan...
Handy VCSA (vCenter Server Appliance) Operational KB Resources | virtuallyGhetto
PowerShell module to automate restoring SQL Server backups - Stuart Moore
Almost 40 percent of enterprises hit by ransomware in the last year
Digital evolution -- how computers have changed the world
Sniffing Bluetooth Devices With A Raspberry Pi | Hackaday
Single Board Revolution: Preventing Flash Memory Corruption | Hackaday
Security implications of upgrading to Windows 10 – The Deployment Guys
Your laundry is done | Tinkerman
Cuddletech | Containers, Now and Then
BIOS to UEFI SecureBoot on Lenovo Desktops Gotcha! | Keith"s Consulting Blog
- Replacing your HVAC system can be expensive ... here’s how to get the best val...
LiFePO4wered/Pi • Hackaday.io
Foreman :: Manual
LucD notesSecurity - Hardening - Part 1 - Virtual Machines - LucD notes
The future of work ‹ Japan Today: Japan News and Discussion
Docker - Ansible - ELK Stack - EverythingShouldBeVirtual
DiagrammeR - Documentation
Windows Batch Scripting: Advanced Tricks - /* steve jansen */
Raspberry Pi as Cisco Console Server | NetworkLessons.com
konig
10 SQL Tricks That You Didn’t Think Were Possible – Java, SQL and jOOQ.
VMWare Esxi Shell - FroggDev - En
Escalating To CNC Through Proxxon’s Tool Line | Hackaday
Script to add disk to existing VM on ESXi | a Linux Rat in the Lab
start [X2Go - everywhere@home]
Open Network Linux
Reset a Windows 10 password - 4sysops
Facebook open sources a 17-camera 3D-360 video capture system
Happy Sysadmin Appreciation Day 2016 | Opensource.com
Using the Script Param to Pass Parameters into Pester Tests - Wahl Network
A Case Study in Attacking KeePass – harmj0y
A History of Ransomware: Where It Started & Where It"s Going
Parrot Security OS - A Debian Based Distro for Penetration Testing, Hacking and ...
IT or Business? Who should manage SharePoint site security? - SharePoint Maven
Reverse SSH Tunnelling over SSL with the Raspberry Pi - emtunc"s Blog
Telco central offices could be in for open source makeover | Network World
Linux Servers and Security Howtos - Chris Binnie - Linux Server Tutorial
An Introduction to Iridium, an Open Source Selenium and Cucumber Testing Tool - ...
Five tips for using revision control in operations | Opensource.com
Easily Encrypt your Flash Drives with Linux | Linux.com | The source for Linux i...
OKRs — The Fundamentals — Medium
Tips for scripting in Perl | Opensource.com
Systemback - Restore Ubuntu Desktop and Server to previous state
WMI: Stop hurting yourself by using “for /f %%s in (‘dir /s /b *.mof *.mfl’) do ...
Start, CMD (Run As Admin)
Compare Funeral Home Prices, Photos, and Reviews | Parting
Home | AFCEA International
May 2016 – Rule of Tech
Health Level 7
Privacy & Security | HIMSS
nist-csf-to-hipaa-security-rule-crosswalk-02-22-2016-final.pdf
Combined Regulation Text of All Rules - hipaa-simplification-201303.pdf
NIST-Security-HIPAA-Crosswalk | HHS.gov
Healthcare security: Adapt or die | Healthcare IT News
Healthcare Information Security News, Regulations, White Papers, Webinars, & Edu...
PowerUp – harmj0y
Private Cloud + Pu...
How To Use Vagrant To Create Small Virtual Test Lab on a Linux / OS X / MS-Windo...
Build VMware Appliances with Packer on Linux · Development and DevOps
The Glitch
SSH with Keys HOWTO: SSH with Keys in a console window
IHE Wiki
Virtual Foundry: Hardening the VMX File: How Your Servers May Already be 0wned b...
How To Patch vSphere 5 ESXi Without Update Manager • Chris Colotti"s Blog
25+ examples of Linux find command – search files from command line
Penetration Testing & Vulnerability Assessment | Core Impact
OScanner | cqure.net
Cloud South
Born Sysadmin...: Ansible: Generating a SSH pub key file and uploading to other ...
PowerCLI: Update VMX Configuration Parameters (in mass) - The Practical Administ...
Some ESXi CLI Commands – #vBrownBag
STIG Compliance with Ansible - Sam Doran
Project Jellyfish
NIST - Security and Privacy Controls for Federal Information Systems and Organiz...
nvlpubs.nist.gov
Guide for Applying the Risk Management Framework to Federal Information Systems ...
Mingw-w64 - GCC for Windows 64 & 32 bits [mingw-w64]
Heads Up! Do Not Upgrade VMware Tools on Hosts with ESXi 6.0 U1b | Long White Vi...
Injecting Windows Updates into install WIM files via MDT - deKay"s Blog
LinuxCommand.org: Learn the Linux command line. Write shell scripts.
A List of FREE VMware vSphere Tools | Tech Blog
Syncthing
q4-2015-state-of-the-internet-security-report.pdf
Security/Guidelines/OpenSSH - MozillaWiki
Hak4Kidz | Home
Jenkins build server with a Vagrant Box
Google Code Archive - Long-term storage for Google Code Project Hosting.
Microsoft EMET 5.5 Released – Benefits, New Features, Protection, Logging, & GPO...
Oracle Hardening – Part I – AVsecurity
DICOM Validation Toolkit (DVTk.org)-Make DICOM Easy.
John Rouillard"s Home page
Archi | Free ArchiMate Modelling Tool
Joanne Skywalker, Author at an andalusian bitch
Radiology, News, Education, Service
Vagrant Manager - Home
Undertow · JBoss Community
Rendition InfoSec
Use the Unofficial Bash Strict Mode (Unless You Looove Debugging)
How "Exit Traps" Can Make Your Bash Scripts Way More Robust And Reliable
Pretengineer | Packer, Vagrant and your Infrastructure – Fitting the Pieces Toge...
VMware ESXi - Foreman
serverspec.org
RHEL6 Kickstart Script
OSINT
How To Power a VM On or Off via SSH - The vCenterNerd
vCenter Server Virtual Appliance – Changing SSL Certs Made Easy « Long White Vir...
[SAGE] Do we still need separate partitions for /boot, /, /tmp, /var, /home, et....
Welcome to Test Kitchen - KitchenCI
Release Schedule
STIGs Master List (A to Z)A-Z
Cybersecurity Education, Training and Awareness Online Training
Home Server Show
The Outspoken Wookie: Bootable Windows Server 2012 ISO
GraphViz Examples and Tutorial
Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions
Building a Windows Vagrant Base Box with Packer
explainshell.com - match command-line arguments to their help text
Remove Extra Registry Settings from GPO - emtunc"s Blog
Index of /140410/products/datfiles/4.x/nai
Every Program Should Have a Philosophy
gressgraph - visualize your iptables firewall
Open Source Software FAQ
setup - Gathers facts about remote hosts — Ansible Documentation
Playbook Roles and Include Statements — Ansible Documentation
Intro to Playbooks — Ansible Documentation
Getting Started — Ansible Documentation
Frequently Asked Questions — Ansible Documentation
HowTos/Network/IPTables - CentOS Wiki
Small getopts tutorial [Bash Hackers Wiki]
Improve your web application security with Burp Suite web vulnerability scanner
Validating an IP Address in a Bash Script | Linux Journal
rConfig - Network Configuration Management
SQL Server 2014 Best Practice: Set built-in Sysadmin(sa) account as an default o...
Security baselines for Windows 8.1, Windows Server 2012 R2 and Internet Explorer...
Speed up your ssh connections with compression
BLACKLISTALERT.ORG - Test if your IP or DOMAIN is listed in a spamdatabase
Volkswagen Restoration Tips, Resources, and Pictures, from BusTopia.com
Microsoft Advanced Threat Analytics – My best practices – MSitPros Blog
10Gbps over 62.5µm Multimode Fiber
Train SharePoint Users within SharePoint sites | VisualSP Blog
24 hours of air traffic over northern germany. - c0t0d0s0.org
pshitt: collect passwords used in SSH bruteforce » To Linux and beyond !
Using DOM with nftables » To Linux and beyond !
Multicast on a LAN in Linux
DNS Loops – how to not configure DNS forwarding
Proof that you can loop any tcp service?
Well-Known Intervals | Router Jockey
Using the Kindle as an information display | Randomcoderdude"s blog
WWoIT - Wayne"s World of IT: VMware PowerCLI commands
WWoIT - Wayne"s World of IT: VMware vSphere PowerCLI commands
The downsides of collaboration between coworkers - Business Insider
- 10 home repairs to tackle this spring - Bargaineering
75 Frugal Hacks for Your Home
10 Things Your Boss Wishes You Knew
Conquer the Chaos of SharePoint End User Support | VisualSP Blog
Raspberry Pi-based signage stack gets Snappy
Speedup your KVM migration in Proxmox · Igor Moiseev
SSD - the definitive guide for Linux! · Igor Moiseev
How to Scan for Rootkits, backdoors and Exploits Using "Rootkit Hunter" in Linux
Learn Python Control Flow and Loops to Write and Tune Shell Scripts - Part 2
Build your very own PC keyboard
Hardening Framework
DISA Security Guidance, Security Readiness Review
Bundler: The best way to manage a Ruby application"s gems
Easy IIS SSL Hardening – Cooking Computers
Boxstarter
How Many of These Meeting Etiquette Rules Do You Follow?
Are ESXi Patches Cumulative - VMware vSphere Blog
Virtual Appliances getting more secure with vSphere 5.5 - Part 4 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 3 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 2 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 1 - VMware vSpher...
VMware: VMware vSphere Blog: Automate the Hardening of Your Virtual Machine VMX ...
Response: Cryptech - A Open Source HSM - EtherealMind
VMware: VMware vSphere Blog: Quickest Way to Patch an ESX/ESXi Using the Command...
TSCMD108 FAQ: How can I execute a script one line at a time to debug it? Assorte...
Errata Security: My Raspeberry Pi cluster
Microservices Gone Wild - Tech Dive Part 2 - MovingPackets.net
Microservices Gone Wild - Tech Dive Part 1 - MovingPackets.net
Remove-SQLDatabaseSafely My First Contribution to DBATools | SQL DBA with A Bear...
Get Antivirus Product Status with PowerShell
Extrasphere | Tools for managing VM data in vSphere environments
SSL | panticz.de
shelltestrunner
VMware backup script | blog.erben.sk
ISCSI_FC_Comparison.pdf
The analog frontend of the SDS7102
Cockos Incorporated | LICEcap
Continuous Integration and Deployment service for Windows developers - Appveyor
Hardening - Sam Stelfox - Software Engineer & Linux Gubernāre
OpenSecurityTraining.info
Josh Stone"s Web Site: SQShell
Healthcare / Health Care Security Services from HSS | HSS Inc.
Josh Stone"s Web Site
NIST.gov - Computer Security Division - Computer Security Resource Center
Tirasa Blog - OpenIAM Identity Manager vs Apache Syncope - first approach
A Quick Introduction to Vagrant · Scott"s Weblog · The weblog of an IT pro speci...
Sane shell environment on Windows
My Open Wallet: Telling Children About How Much Money You Make: A Personal Finan...
Performance impact when using VMware snapshots | blog.erben.sk
Max Berger"s Technical Goodies: PEM from/to P12
Replacing vCenter Server Appliance SSL certificates | blog.erben.sk
WPAD Persistence · Room362
Simple Virtualization With Ubuntu 16.04 and KVM
Promises, Lies, and Dry-Run Mode - A Fistful of Servers
Iterating over a list of tuples in bash @  Bergman Lab
8 Tips for creating better bash scripts | Benjamin Cane
blockdiag - simple diagram images generator — blockdiag 1.0 documentation
How To - Use VMware vSphere PowerCLI to patch hosts | 9to5IT
Visualizing your bash history with d3.js | Andrew Berls
D3.js - Data-Driven Documents
Cyber Explorer: Sniffing and decoding NRF24L01 and Bluetooth LE packets for unde...
Packer - Vagrant - Ansible - Windows (WinRMTransport Error) - EverythingShouldBe...
Mental Models I Find Repeatedly Useful — Medium
Home - Veertu - Run Windows and Linux on your Mac
Overview | Setting up a Raspberry Pi as a WiFi access point | Adafruit Learning ...
Pi-Point :: Home
NetPi - Raspberry Pi Network Analyzer - Blame The Network
Scheduling Veeam Backup Free Edition backups | mwpreston.net
Turn Your Raspberry Pi Into a WiFi Hotspot with Edimax Nano USB EW-7811Un (RTL81...
ESP8266 based Plane Spotter – How To | Squix TechBlog
ADS-B Exchange – World"s largest co-op of unfiltered flight data
Adam Caudill – Security Consultant, Researcher, & Software Developer
Adam Caudill
GNS3 | The software that empowers network professionals
Fluent Time Management Helps You Flow Efficiency Into Your Life.
From the archive: Parkinson"s Law | The Economist
Parkinson"s Law
Pick Parts, Build Your PC, Compare and Share - PCPartPicker
Microsoft Patches
Logical Increments - PC Buying Guide
OWASP Bricks - OWASP
Internet-Wide Scan Data Repository
int3.cc
The DBA"s Essential Index Monitoring and Maintenance Tasks - SQLServerCentral
Pre-Built Developer VMs for Oracle VM VirtualBox | Oracle Technology Network
Automated Printer Data Harvesting Tool
USGS CIDA Stig
Statistics for Engineers
Serverless Architecture - PragueJS 30.6.2016 // Speaker Deck
U.S. Government Publishes EDB Postgres Advanced Server Security Technical Implem...
History of the Capacitor – The Pioneering Years | Hackaday
Secure Software Design and Programming: Class Materials by David A. Wheeler
Ransomware Is Coming to Medical Devices | Motherboard
OpenVPN - Secure you server administration with multiplatform VPN connection
Great Wide Open 2016 lightning talks: Jason van Gumster | Opensource.com
Encrypt files and data with Ccrypt or Mcrypt on Ubuntu Linux
vCenter Server Versions Numbers - How to find?
Parsing an RSS News Feed with a Bash Script | Linux Journal
8 Best Screen Recorders for Desktop Screen Recording in Linux
Deleting Large amounts of data in SQL Server – Part 2 - Stuart Moore
Deleting Large amounts of data in SQL Server - Part 1 - Stuart Moore
Open Source Solar | Hackaday
Decentralized network 42
Windows-Hardening.pdf
Designing and Building Great Dashboards - 6 Golden Rules to Successful Dashboard...
CMDB.info : CMDB Evolution 2010
Home — CMDBuild
i-doit open - Open-Source CMDB
MSSQLSERVER_3417
iFountain.com
Main Page - OneCMDB
sharepoint2013 stigs
SQL Products - SQLSecurity Home
SamuraiSTFU
Enterprise — Decent Security
Make Your PowerShell Scripts Talk Back -- Microsoft Certified Professional Magaz...
Script Template with logging function - PowerShell.com – PowerShell Scripts, Tip...
Simple PowerShell Script Logging | Jack Fruh"s SharePoint blog
PowerShell: How to easily create log files for your scripts | 9to5IT
Solaris Unattended installation - Foreman
iTop: open source ITIL ITSM CMDB Software
Windows could not start the SQL Server (MSSQLSERVER) on Local Computer... (error...
"Alarming" rise in ransomware tracked - BBC News
Unattended installation of VM images with Packer
s10-security-dive.pdf
http://h17007.www1.hp.com/docs/interoperability/Cisco/HP-Networking-and-Cisco-CL...
Nyxbone - Ransomware Overview: Complete ransomware malware list.
How to properly harden your operating systems - SVERDIS
How to Install The Foreman and a Puppet Master on Debian Wheezy | Midacts Tech
Search for Windows Updates takes forever? - A possible solution
HAProxy, highly available using carp or keepalived… | Beck"s *nix Blog
DICOM Homepage
Managing DICOM images: Tips and tricks for the radiologist
Using PowerShell to compare a registry key before and after a change | Techazine
5 steps to a better Windows command line | 53 Bytes - by Justin Beckwith
Locking it down: Steps to Oracle database security • The Register
Open Security Research: Top 10 Oracle Steps to a Secure Oracle Database Server
Log Parser Rocks! More than 50 Examples! | LichtenBytes
What Makes Carbon Black Unique?
Woody’s no-bull news, tips and help for Windows and Office.
Managing many servers with Foreman - Lukáš Zapletal
"The Foreman" - Automatic installation of "The Foreman" with Puppet - codecentri...
"The Foreman" - A complete lifecycle management tool - codecentric Blog : codece...
Green Goddess Rice Recipe : Claire Robinson : Food Network
6 ways to improve SharePoint site speed and performance - SharePoint Maven
InfoSec Handlers Diary Blog - Pentesters (and Attackers) Love Internet Connected...
How To Survive A Database Disaster - Thomas LaRock
4 Good Open Source Log Monitoring and Management Tools for Linux
Raspberry Pi SD Card Image is too big for another SD Card
Facebook reveals open-source wireless platform, OpenCellular
High-Availability Storage with GlusterFS on CentOS 7 - Mirror across two storage...
Using the new SQLServer Powershell module to get SQL Agent Job Information | SQL...
10 Super-Fast, Super Free Ways to Improve Your Website | Technogog
Research & Community | ERNW – Providing Security.
Evil FOCA
How To Setup Bridge (br0) Network on Ubuntu Linux 14.04 and 16.04 LTS
How to Update Your Windows Server Cipher Suite for Better Security
Cipher Suite
MIIT_2009_DicomCompression_Clunie.ppt - MIIT_2009_DicomCompression_Clunie.pdf
myotherpcisacloud.com | AD Is Full of Bitmasks, Decipher Them with Powershell
7 Security Podcasts You Should be Listening to - TunnelsUP
Back to basics – Hot add new disk to Linux VM – Pragmatic IO
Thorstein Veblen Quotes - The Quotations Page
RMF for DoD IT - Risk Mangement Framework for DoD IT
DevOpsSec - devopssec.pdf
packer-build
Secure IIS Web Server & disable weak ciphers - redmad.com
Runnablog — 9 Common Dockerfile Mistakes
Latest Posts – dodwell.us
OpenNotes
Simple Windows Batch Scripting for Intrusion Discovery - simple-windows-batch-sc...
installing & Configuring WSUS in Windows Server 2016 | Nyazit
Oracle Database Security: What to Look for and Where to Secure - oracle-database...
GNUbatch - GNU Project - Free Software Foundation
Ysoserial
Packer
Report Generator
Managing Your Infrastructure Part 1: Setup Foreman
PowToon, free business presentation software animated video maker and PowerPoint...
HackMag – Security, malware, coding, devops
Opencover
Executive Dashboards | Dashboard Examples - Klipfolio
Responder
How to Crack Android Full Disk Encryption on Qualcomm Devices
Welcome to The Oracle FAQ | Oracle FAQ
Diigo - Web Highlighter and Sticky Notes, Online Bookmarking and Annotation, Per...
Open source software testing tools
Brakeman
SCC Home
What I learned while securing Ubuntu - major.io
Bvckup 2 | Simple fast backup
masscan
Sysdig | Home
EXPERIENCING INFORMATION | Thoughts on how we experience information in the digi...
5 SSH Hardening Tips | Linux.com | The source for Linux information
Understanding How to Stay Safe Online in 2016
Tips You Can Use to Take Better Photos of Fireworks
SCC Download
Managed Security Monitoring: Selecting a Service Provider
MATRIX - The World’s First Smart Home App Ecosystem by AdMobilize — Kickstarter
Active Directory Groups or SharePoint Groups? - SharePoint Maven
GraphDash by AmadeusITGroup
Golden times in IT security ‹ Japan Today: Japan News and Discussion
Why are hackers increasingly targeting the healthcare industry? - Help Net Secur...
Top 10 PowerShell Scripts that VMware Administrators Should Use | Virtual-Strate...
A List of FREE VMware vSphere Tools | Tech Blog
Secure home automation, without clouds or dedicated hubs
SQL Server Trace Flags - Thomas LaRock
The Four Hundred--The AS/400 At 28: A HENRY, Not A DINK
Crypto-ransomware attacks increase five fold
STARTING A BUSINESS ON A SHOE STRING BUDGET - Business Opportunities
SolveSpace - parametric 3d CAD
Remediating vSphere Configuration Drift with PowerShell Pester Tests - Wahl Netw...
Is BGP Really that Complex? « ipSpace.net by @ioshints
LACP Configuration Examples (Part 7)
HOW TO: Restore the Master Database in SQL Server 2016 - Thomas LaRock
How to roll up calendars in SharePoint - SharePoint Maven
17 Great Apps That"ll Make Your Life Easier
Smem - Reports Memory Consumption Per-Process and Per-User Basis in Linux
TOP 5 Backup Software for VMware Infrastructure
What is the Data Center Tier System? | The Server Rack FAQ
Linux Servers and Security Howtos - Chris Binnie - Redirecting Traffic Tutorial
Your Network Is Too Slow For Flash And What To Do About It | Long White Virtual ...
LucD notesvSphereDSC - VmwFolder - LucD notes
Horchata Made Easy Recipe - Allrecipes.com
Python - NMAP/SSH Fun - EverythingShouldBeVirtual
Pi Zero on a digital frame - Garage Tech
Vagrant - Multi-Group Ansible Provisioning - EverythingShouldBeVirtual
25 Practical examples of the find command | LibreByte
Getting started with GIMP | Opensource.com
Etcher by resin.io
Setting up Ubuntu & CentOS as a guests on bhyve
GitHub - churchers/vm-bhyve: FreeBSD Bhyve VM Management
bhyve - BSD Hypervisor
TeslaCrypt shuts down and Releases Master Decryption Key
MalwareJake: Securing healthcare? You need an MDM strategy, even for BYOD
25 Useful Basic Commands of APT-GET and APT-CACHE for Package Management
Auditd - Tool for Security Auditing on Linux Server
OpenFIPS Project - Axioma
Real World Computing: How to Create a Good Email Signature and Use it in IBM Ver...
@JKevinParker: Digital Transformation In Action: 21 Things You Need to Know
@JKevinParker: Solution Success Means User Adoption
The problems with forcing regular password expiry
Complete STIG List
Disa STIG Viewer Tutorial - YouTube
John"s Linux Blog: FIPS integrity verification test failed.
Microsoft Word - U_RedHat_6_V1R2_Overview_STIG-201306040830.docx - U_RedHat_6_V1...
Scanning remote machines with OpenSCAP | Martin Preisler
2013-07-21-MITRE-Dev-Days-Shawn-Wells-Red-Hat-Remediation.pdf
IronBee - Open Source Web Application Firewall
ModSecurity: Open Source Web Application Firewall
Mad Irish :: Home
Radiology, News, Education, Service
Alan"s Blog » Blog Archive » ShareEnum Alternative
Download Microsoft File Checksum Integrity Verifier from Official Microsoft Down...
Automatically testing and validating the Ansible STIG Role for Red Hat 6 | Davil...
Security Configuration Remediation with Tripwire | Tripwire
Ransomware Hackers Blackmail U.S. Police Departments - NBC News
Ansible Lockdown
InfoSec Handlers Diary Blog - Kippos Cousin Cowrie
cowrie
DISA STIG Remediation: Automagically
Defeating Ransomware with EventSentry & Auditing – EventSentry Blog
Making STIG Automation Possible: A Technical Deep Dive
MalwareJake
Cisco Talos Blog: Ransomware: Past, Present, and Future
Open Source Clinical Image and Object Management
WildFly - JBoss Application Server has a new name... WildFly.
NetBeast
InfoSec Handlers Diary Blog - DNS and DHCP Recon using Powershell
InfoSec Handlers Diary Blog - Neutrino exploit kit sends Cerber ransomware
How To Install and Get Started with Packer on an Ubuntu 12.04 VPS | DigitalOcean
How to Manage SharePoint Implementation (VIDEO) - SharePoint Maven
6 Pearls of Career Wisdom From Brian Tracy
1. Success Starts With a Positive Self Image 2. Use the Rule of Three to Maximize Your Priorities 3. Don"t Underestimate the Power of a To-Do List 4. Develop the Right Habits 5. First One to Work, Last to Leave 6. Invest 3% in Your Personal Growth
Clint Boessen"s Blog: Microsoft Word Performance Issues - KB3114717
SQL Server 2016: What Time Is It? - Thomas LaRock
How much swap should I use on my VM? | Jethro Carr
PETYA ransomware targets enterprise users via the cloud and overwrites MBRs
Slack for Non-Profits – EMail is Obsolete! | tfnp
Set default text editor in Ubuntu | tfnp
Hosting with Linode | tfnp
The Internet Enabled Kill-A-Watt | Hackaday
CryptoWall CryptoLocker – Here’s what you should be doing
O R G A N I C / F E R T I L I Z E R: Accessing a Protected Domain Administrator ...
Hackers have figured out how easy it is to take down a hospital | Fusion
Resolve IP Addresses to Hostname using PowerShell | Gary"s $this and that about ...
Cryptol Home
[rancid] Fwd: Re: Rancid-Ubiquity
Reducing Windows Deployment time using Power Management | The Deployment Guys
Amazon #AWS Tips and Gotchas – Part 3 | Tekhead.it
Boxcutter
8 Best Open Source Music Making Softwares for Linux
Miracast in Enterprise Environments – FAQ | The Deployment Guys
Lynis 2.2.0 Released - Security Auditing and Scanning Tool for Linux Systems
web.nvd.nist.gov
Security Guidance : Cloud Security Alliance
FFIEC IT Examination Handbook InfoBase - Security Guidelines
The security laws, regulations and guidelines directory | CSO Online
Information Security and Privacy Program | HHS.gov
NIST.gov - Computer Security Division - Computer Security Resource Center
alpine-3.3-x86_64.json
How to Build a Secure DevOps Environment for Government and Beyond - YouTube
How To List and Delete Iptables Firewall Rules | DigitalOcean
Microsoft Word - CHIME AEHIS Letter to FDA on Cyber Guidance V5 - CHIME-AEHIS-Le...
ORACLE-BASE - Linux Firewall (iptables, system-config-firewall)
Vagrantfile Explained: Setting Up and Provisioning with Shell
NVD - National Checklist Program Repository
Handy one-liners for SED
vulnerability scanners - Difference between hardening guides (CIS, NSA, DISA) - ...
Automatic Sonicwall Backup Script | Sysadmin Rambling
The Forwarding Plane - Routing, Switching, general security and anything else I ...
healthitsecurity.com
Home : Occupational Outlook Handbook : U.S. Bureau of Labor Statistics
Welcome to the LEDE project
How to Download Official Windows ISO Files Free from Microsoft
HOW-TO: Add live websites to GIT without interruptions or security risks « Dange...
How long did it take to encrypt the harddrive? – MSitPros Blog
$BitLockerEvents = get-eventlog -LogName system -Source Microsoft-Windows-BitLocker-Driver $BitLockerStart = ($BitLockerEvents | where{$_.Instanceid -eq 24577}).TimeGenerated $BitLockerFinished = ($BitLockerEvents | where{$_.Instanceid -eq 24579}).TimeGenerated $TotalTime = $BitLockerFinished – $BitLockerStart $Hours = $TotalTime.Hours $Minutes = $TotalTime.Minutes $Seconds = $TotalTime.Seconds
Samsung SmartThings Security Flaw: What You Need to Know
Crowdsource your security knowledge: A simple guide to OWASP Top 10
DevOps means Test Automation (too)
Waze vulnerability allows hackers to track you
4.2 Regulatory Affairs Basics - Medical Devices - YouTube
Harvard i-lab | Understanding Medical Device Development - YouTube
ISO 13485:2016 - Medical devices -- Quality management systems -- Requirements f...
Quality System (QS) Regulation/Medical Device Good Manufacturing Practices
WordPress Woes and .htaccess | tfnp
Visual Studio Code - Code Editing. Redefined
Free ebook: The Security Development Lifecycle | Microsoft Press blog
FossHub
How to Create, Deploy and Launch Virtual Machines in OpenStack
Low-Budget Hosting Tips
The I3P
Beans Place: AutoVer
 QStar Technologies
Why Giant Hospital Systems Might Be Getting it Wrong | Michelle Chaffee | Linked...
Why Giant Hospital Systems Might Be Getting it Wrong
DSHR"s Blog: Talk at Seagate
Windows Server 2016 Active Directory Installation Guide
ESXi Commands List - Snapshot Deletion Monitoring
Diskless true SSH honeypot using Alpine Linux - rationallyPARANOID.com
Static Site Generator | Nikola
Provisioning a Development Environment with Packer, Part 1 | End Point Blog
Open Source Software FAQ
OpenStack Summit interview with Massimo Ferrari and Erich Morisse | Opensource.c...
10 Useful "Interview Questions and Answers" on Linux Shell Scripting
How to Use Awk to Print Fields and Columns in File
How to deal with renamed network interface names? / Networking, Server, and Prot...
Unexpected predictable systemd network device names
Pubfig: Public Figures Face Database
Proxmox Auto-Migration of VM"s | Tek Syndicate
51 Best DevOps Tools for #DevOps Engineers | ProfitBricks Blog
Facilities Management Software | iOffice
dcept - Honeytoken
Day in Tech History - Daily Tech History Podcast & Blog 365 Days a Year
This Day in Tech History — The History of Technology in a Daily Blog!
Oxidize
Welcome to the LEDE project
How to add a slideshow to SharePoint Site - SharePoint Maven
OpenStack cloud’s “killer use case”: Telcos and NFV | Network World
Infiniband: An Inexpensive Performance Boost For Your Home Network - Patshead.co...
Would I Still Buy a QNIX QX2710 in 2015? - Patshead.com Blog
How to create an Employee Directory in Sharepoint - SharePoint Maven
How to implement Document Management System in SharePoint using Content Types - ...
4 Men with 4 Very Different Incomes Open Up About the Lives They Can Afford
VMware VCSA - Configure NTP
How to Get the Greenest Lawn on the Block — Naturally
9 Tools That All Electronics Labs Must Have | Random Nerd Tutorials
11 Clever Uses for Your Raspberry Pi | Random Nerd Tutorials
Random Nerd Tutorials
Raspberry Pi Web Server using Flask to Control GPIOs | Random Nerd Tutorials
About - Open Homelab
The Internet of Things has a dirty little secret — Internet of Shit — Medium
I’m over tech people. – Michael O. Church
Keygen alert: free password generator released for PETYA ransomware
Bulk Storage of AA and AAA Batteries using an Ammo Box - aBrainDump.com
/bin/bash based SSL/TLS tester: testssl.sh
Fix / update systemd in Debian Jessie LXC container | panticz.de
Docker Part 4: building and publishing custom docker images
Ultimate Guide to Cybersecurity for Employees
Platform 3 – The Build-Out of the Private Cloud, Converged Infrastructure and th...
FREE vs Paid - StarWind Virtual SAN
Understanding block sizes in a virtualized environment | vmPete.com
My vSphere Home Lab. 2016 edition | vmPete.com
O R G A N I C / F E R T I L I Z E R: Excel and the Mysterious Hang
9 Practical IKEA Hacks for Your Office & Workstation
Cool Things to Do with the Windows 10 Lock Screen
How to Change the Default Language & Region in Windows 10
How RAM Compression Improves Memory Responsiveness in Windows 10
Start Explorer elevated in one command – MSitPros Blog
How to Build a DIY Rack Case (and Why)
How to Install, Create and Manage LXC (Linux Containers) in RHEL/CentOS 7
Managed services killed DevOps | TechCrunch
How to setup HAProxy as Load Balancer for MariaDB on CentOS 7
Using Foreman, an Opensource Frontend for Puppet -
If you know Big Data, you must meet Liger | Pentaho
10 Ubuntu / Debian Linux apt Command Examples
11 Excellent Open Source Solutions for Home Automation - Linux Links - The Linux...
Continuous Integration, Delivery or Deployment with Jenkins, Docker and Ansible ...
private-vlan - CCIE Blog
DevOps | vMiss.net
dhcpcd - ArchWiki
How to use Vagrant on Windows — osteel"s blog
System Administration Screencasts
ExeFilter - an open-source tool and framework to filter files and active content...
Center for Internet Security
OhSoft(ohsoft.net) - Best Software Developer
Saveen Reddy"s blog
Home | OpenSCAP portal
How to Install and Configure "Ansible" Automation Tool for IT Management - Part ...
The Three Ways: The Principles Underpinning DevOps - IT Revolution IT Revolution
Shellshock Vulnerability and How to Patch Servers Using Ansible
Nortel Telephone Systems : The Nortel Specialists : 1st Communications Installat...
Start Learning Ansible With One Line And No Files | Mechanical Fish
CS1K Technical Docs
SharePoint 2013 Publishing feature and limited access - Bperson Everything Share...
8 Everyday Things That You Can Track with Text Files
Turn Your RPi 3 Into a BLE Beacon | Hackaday
14 Outstanding Backup Utilities for Linux Systems
InfoSec Handlers Diary Blog - Improving Bash Forensics Capabilities
OpenFrame
Raspberry Pi Art Frame using OpenFrame | Hackaday
AllPro Adapter
First Steps With Windows Containers | Thomas Maurer
Managing PowerShell Functions
Puppet + Vagrant VS librarian-puppet | The eternal fight between admins and comp...
Linked - One in five employees would sell their work passwords, some for less th...
Heating Help #1 Online Resource for Heating Answers
FBI"s Advice on Ransomware? Just Pay The Ransom. | The Security Ledger
New self-protecting USB trojan able to avoid detection
Applying Windows Updates to a base WIM using DISM and Powershell |
Best Ever Mushroom Soup
DNS Loops – how to not configure DNS forwarding
Car Speed Detector | greg tinkers
Size matters at Japan phallus festival ‹ Japan Today: Japan News and Discussion
Errata Security: Some notes on Ubuntu Bash on Windows 10
10 Steps to Living an Amazingly Wonderful Life
InfoSec Handlers Diary Blog - Tips for Stopping Ransomware
Use Software Restriction Policies To Block Viruses And Malware | Branko Vucinec
Errata Security: How to detect TrueCrypt blobs being passed around
reverse proxying attacker tools · Room362
pfSense without Internets · Room362
Powershell Popups + Capture · Room362
Why good leaders make you feel safe · Room362
Effective NTLM / SMB Relaying · Room362
Using PowerShell + Word Interop to Extract Tables from PDFs | chentiangemalc
ShareX - Take screenshots or screencasts, annotate, upload and share URL in clip...
DVDStyler - Free DVD Authoring Application
G"MIC - GREYC"s Magic for Image Computing: A Full-Featured Open-Source Framework...
How to set Security for a SharePoint site - SharePoint Maven
RHEL - Get Started
10 "ARGH!" moments every computer user experiences
vSphere HTML5 Web Client – VMware Labs
8 Annoying Windows 10 Issues & How to Fix Them
Training as Acting
Free Tools VMware
Amazon #AWS Tips and Gotchas – Part 4 – Direct Connect & Public / Private VIFs |...
TreeSheets : Free Form Data Organizer
Compare and Contrast - VSAN and VVols - CormacHogan.com
Vagrant and Windows
Git - Downloads
Varying Vagrant Vagrants is an open source Vagrant configuration focused on Word...
Getting Started with Vagrant on Windows
Setting up Your Raspberry Pi as a Git Server
#AWS Certified Solution Architect Associate Exam Study Guide & Resources | Tekhe...
Run the AWS Shell Quickly and Easily in a VirtualBox Instance Using Vagrant – Di...
Setting Sound Volume and Unmuting with PowerShell - DeployHappiness
Backup Switch Configurations with PowerShell - DeployHappiness
DSHR"s Blog: Dr. Pangloss loves technology roadmaps
Ansible - Using the set_facts module - EverythingShouldBeVirtual
Using Vagrant and VirtualBox to Run Sandbox Environments – DiscoPosse.com
Amazon shows you how to make an Echo with Raspberry Pi
Diffie-Hellman-Primes
Take a 360-degree video tour of Google"s Oregon data center
ZFS Automatic Snapshot Service for Linux
Secure File Transfer | Linux Journal
How to detect the type of virtualization from the command line - Ask Xmodulo
Transferring Conserver Logs to Elasticsearch | Linux Journal
LXC: create Ubuntu Xenial container | panticz.de
CLI | panticz.de
SharePoint Sync Issues? Stop syncing SharePoint Document Libraries! - SharePoint...
10 questions to ask your users before you create a SharePoint Site for them - Sh...
Decoding Prefetch Files for Forensic Purposes: Part 1
Active Directory Security » Active Directory & Enterprise Security, Attack Metho...
piStudio • Hackaday.io
Brother MFC-1910W | panticz.de
How to Sync MS Project with SharePoint - SharePoint Maven
SharePoint Debugging: Not without a trace | SharePoint Dragons
6 reasons to use SharePoint Out of the Box functionality - SharePoint Maven
12 Linux dd command examples - The Linux Juggernaut
29 Quick Money Tricks | Budgets Are Sexy
Docker: How to use it in a practical way - Part 3
Docker: How to use it in a practical way
How to use Docker in a practical way (part 1 - Introduction)
Details • Monitoring washing machines • Hackaday.io
Setting Up Web-Based Guacamole Tool To Access Remote Linux/Windows Machines
InfoSec Handlers Diary Blog - Forensicating Docker, Part 1
Powershell Malware - No Hard drive, Just hard times - SANS Internet Storm Center...
LFCS: How To Explore Linux With Installed Help Documentations And Tools - Part 1...
LFCS: How To Manage And Create LVM Using Vgcreate, Lvcreate And Lvextend Command...
Understanding & Learning Basic Shell Scripting And Linux Filesystem Troubleshoot...
Managing Users & Groups, File Permissions & Attributes And Enabling Sudo Access ...
Linux Package Management With Yum, RPM, Apt, Dpkg, Aptitude And Zypper - Part 9
LFCS: Managing System Startup Process And Services (SysVinit, Systemd And Upstar...
LFCS: Assembling Partitions As RAID Devices - Creating & Managing System Backup...
LFCS: How To Mount/Unmount Local And Network (Samba & NFS) Filesystems In Linux ...
LFCS: How To Archive/Compress Files & Directories, Setting File Attributes And F...
LFCS: How To Install And Use Vi/vim As A Full Text Editor – Part 2
LFCS: How To Use GNU "sed" Command To Create, Edit, And Manipulate Files In Linu...
Getting started with Network Packet Generators - The Network Sherpa
A Decade of Innovation | Perspectives
7 Life Lessons From The Very Wealthy - MoneySmartGuides.com
Performance Testing with Microsoft DiskSpd | Long White Virtual Clouds
The best microSD card
How to Improve Windows Performance with a New File System
Using Ansible to update Linux distributions – Geek and I
Vagrant - Complex Vagrantfile Configurations - EverythingShouldBeVirtual
VSAN Hardware Compatibility List Checker
Self-Hosted Alternatives to Delicious
Windows Server 2012 R2 Network Cmdlets: Part 7 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 6 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 5 | Hey, Scripting Guy! Blog
PowerShell Handy Commands - TechNet Articles - United States (English) - TechNet...
Windows Server 2012 R2 Network Cmdlets: Part 4 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 3 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 2 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 1 | Hey, Scripting Guy! Blog
asciinema - Record and share your terminal sessions, the right way
JanVanRyswyck/awesome-talks
Sensible Bash · Small & opinionated selection of basic Bash configurations for a...
MostlyAdequate/mostly-adequate-guide: Mostly adequate guide to FP (in javascript...
Daniel Miessler : Technology | Philosophy | Culture
Group Policy Search
Borg Documentation — Borg - Deduplicating Archiver 0.30.1 documentation
PIN number analysis
#9980 8557 0.001191% #9981 9047 0.001161% #9982 8438 0.001161% #9983 0439 0.001161% #9984 9539 0.001161% #9985 8196 0.001131% #9986 7063 0.001131% #9987 6093 0.001131% #9988 6827 0.001101% #9989 7394 0.001101% #9990 0859 0.001072% #9991 8957 0.001042% #9992 9480 0.001042% #9993 6793 0.001012% #9994 8398 0.000982% #9995 0738 0.000982% #9996 7637 0.000953% #9997 6835 0.000953% #9998 9629 0.000953% #9999 8093 0.000893% #10000 8068 0.000744%
Shareholder Letters
It rather involved being on the other side of this airtight hatchway: Unquoted s...
Microsoft security advisory: Local Administrator Password Solution (LAPS) now av...
The Case of the App Install Recorder | Aaron Margosis" Non-Admin, App-Compat and...
SigCheck
SQL Server Linked Server Connection Test - Thomas LaRock
Target stores attacked by pornographic pranksters - BBC News
Docker - Building containers using Ansible - EverythingShouldBeVirtual
Amazon #AWS Tips And Gotchas – Part 2 | Tekhead.it
Amazon #AWS Tips And Gotchas – Part 1 | Tekhead.it
Repairing the HackRF | T4F
Understanding block sizes in a virtualized environment | vmPete.com
4 ways to create Drop down navigation in SharePoint - SharePoint Maven
How to build Intranet in SharePoint using out of the box features - SharePoint M...
Install Mod_Pagespeed To Speed Up Apache And Nginx Performance Upto 10x
25 Useful IPtable Firewall Rules Every Linux Administrator Should Know
Email inventor Ray Tomlinson dies
Ray Tomlinson
Vagrant - Ansible Provisioning multi-nodes - EverythingShouldBeVirtual
Fix for Windows 1511 ADK bug | Keith"s Consulting Blog
Is Your Smartphone Listening to You, or Is It Just Coincidence?
IEDigest | Analyze Internet Explorer settings
23105-fast16-papers-schroeder.pdf
LasLabs Blog | Change WebUI Port - Ubiquiti EdgeRouter Lite - LasLabs Blog
Configuring Vyatta router for use with my lab environment | Citrix Blogs
How To Configure Your Ubiquiti EdgeRouter Lite - SmallNetBuilder
Everything you need to know about Windows 10: product keys, secret tools, essent...
Pulse Secure Article: KB11941 - [PCS/PPS] How to use the Radius Test Rig Utility...
RADIUS Performance Testing | Network RADIUS
RADIUS test client (Radlogin v4)
ansible.yml | panticz.de
guide/Radtest
Ansible | panticz.de
Manpage of RADCLIENT
PlayStation 4"s Linux Hack | FOSS Force
Domino Admin Best Practices: Finding the Gremlins | The Notes Guy in Seattle
Install Ansible | panticz.de
InfoSec Handlers Diary Blog - Quick Audit of *NIX Systems
Dilbert’s Financial Advice on an Index Card — My Money Blog
Enable AD Authentication on Network Switches - DeployHappiness
5 Calculators to Decide If You Can Afford a New Car or House
Linked - The Perilous Side of the Cloud: Shadow IT and Excess Data
Putting the Dev in Devops: Bringing Software Engineering to Operations Infrastru...
Update Switch Firmware with PowerShell - DeployHappiness
The Ultimate EXE Silent Switch Finder - DeployHappiness
A Field Guide to the North American Utility Pole | Hackaday
SharePoint 2013: Moving the Usage and Health Database - SharePoint from the Tren...
Tech Bench
Major cities to become "smart" by 2020
How to Create and Run New Service Units in SystemD Using Shell Script
8 Best Video Editing Softwares I Discovered for Linux
ifconfig vs ip: What"s Difference and Comparing Network Configuration
InfoSec Handlers Diary Blog - Tip: Quick Analysis of Office Maldoc
Cloud network DVR - ProtectWise
ArduPilot | Open source autopilot
Kryder"s Law - Scientific American
Mark Kryder
Coretech Blog » Blog Archive » House of Cards–The ConfigMgr Software Update Poin...
Software Freedom Conservancy
Investor Education: 2016 tax rates, schedules, and contribution limits
Vagrant & Ansible Quickstart Tutorial - adamcod.es
The Top 5 Most Common Problems With SQL Server - Thomas LaRock
Tune Your Indexing Strategy with SQL Server DMVs
A case of "easy": Virto SharePoint Bulk Operations Toolkit | SharePoint Dragons
Profiling SharePoint databases | SharePoint Dragons
Implement SharePoint using KISS Principle - SharePoint Maven
5 ways IT leaders should prep for the mobile future | The Enterprisers Project
Change Control using Git(lab) at Brokenhaze
Hiding SharePoint Apps/Add-ins from users | SharePoint Rider
@JKevinParker: Plan a Successful Information Management Solution Implementation
Configuration Manager 1511 adventures | Annoying stuff I figured out (or am tryi...
What are SharePoint Sites, Pages and Web Parts? - SharePoint Maven
Doc Searls Weblog · Rethinking John Wanamaker
Raspberry Pi Gets OpenGL Support | Linux Journal
What"s in the Box? Interrogate Your Linux Machine"s Hardware | Linux Journal
Seth"s Blog: A manifesto for small teams doing important work
Seth"s Blog: Ten questions for work that matters
Architectural Folk Models | Kitchen Soap
A Shoutout to Reliability Monitor - DeployHappiness
perfmon /rel
How to Create Powerful Graphs & Charts in Microsoft Excel
Get Local Group Members with PowerShell
Ansible reboot UNIX-like systems, in sequence – Geek and I
Migrating VMs from PF9 KVM to ESXi - EverythingShouldBeVirtual
Ansible v2.0 vs Windows Update – Geek and I
Ansible - Setting up an Ansible Control Machine - Part-1 - EverythingShouldBeVir...
funoverip/mcafee-sitelist-pwd-decryption: Password decryption tool for the McAfe...
imc152-sicker.dvi - issues.pdf
7 Skill-Building Photography Exercises That Really Work
Why You Shouldn’t Be Hosting Public DNS | Postmodern Security
The Naming of Hosts - MovingPackets.net
Five things I will do different for my next startup — Life Tips. — Medium
Monetize earlier Scale slower Burn less Automate and outsource everything Measure everything
60 in 60 - Admin Tips Power Hour session slides from IBM Connect 2016 | IdoNotes...
The first MIPS processor celebrates 30th birthday
wissel.net :: The 3C of leader - leader: Clarity, Competence, Control
Hard Drive Reviews: Update on 2015 Hard Drive Reliability 
An Ansible Tutorial - Servers for Hackers
Jonathan Medd"s Blog | Automating anything that moves…..
9to5IT - IT Blog
Connecting Ubuntu to Windows shares and DFS trees | Matt Slay, PhC
Back-Flip
How to List all Disabled Indexes in a SQL Server Database | SQL Server Administr...
USE Database_Name GO SELECT i.name AS Index_Name, i.index_id, i.type_desc, s.name AS "Schema_Name", o.name AS Table_Name FROM sys.indexes i JOIN sys.objects o on o.object_id = i.object_id JOIN sys.schemas s on s.schema_id = o.schema_id WHERE i.is_disabled = 1 ORDER BY i.name GO
Small Business Susan | Migratin" over from SBSDiva
Mirrored databases are disconnected after you restart the database mirror in SQL...
Rostyslav"s blog: Encrypting and Decrypting Web.config Sections in .NET 4.0
Potential enhancements to ASPState - SQLPerformance.com
Fix broken shortcuts during file server migrations | Tailspintoys – 365lab.net
Glenn Berry"s SQL Server Performance | Semi-random musings about SQL Server perf...
Virtual LAN Security: weaknesses and countermeasures
Keep It Simple and Fast: Tips to improve performance of MS Reporting service rep...
Keep It Simple and Fast: More tips to improve performance of SSRS reports.
IIS logs sent via NXlog not showing up in Graylog | nxlog.co
Graylog collector and iis logs - Google Groups
Graylog
High Availability High Performance Web Cache - Alpine Linux
Jeff Botsford | Stuff to Refer Back To
Sysadmin continuous improvement | Useful tips and tools for system administrator
WSUSpect Proxy
WSUS – Declining all Superceded Updates – NOW! | Programming, PowerShell and Pan...
Get-WSUSUpdate -Classification All -Status Any -Approval AnyExceptDeclined ` | Where-Object { $_.Update.GetRelatedUpdates(([Microsoft.UpdateServices.Administration.UpdateRelationship]::UpdatesThatSupersedeThisUpdate)).Count -gt 0 } ` | Deny-WsusUpdate
Removing the 100Mb System Reserved Partition after Windows 7 or Windows 2008 R2 ...
Benchmarking Windows Guests on KVM:I/O performance | JRS Systems: the blog
Highly Available, Scale-Out SQL Server 2008 R2 Reporting Services Farm
Sandfeld.net - My substitute brain
Fix problems opening documents in SharePoint libraries - Office Support
New tool: Policy Analyzer - Microsoft Security Guidance - Site Home - TechNet Bl...
Carl Webster | The Accidental Citrix Admin
AdministratorsGuide.pdf
Supermicro IPMI BIOS upgrade fail [Solved!] - Hacker"s ramblings
A Multivendor Post to help our mutual iSCSI customers using VMware - Virtual Gee...
Remotely upgrading BIOS on a SuperMicro servers | Flameeyes"s Weblog
PSAppDeployToolkit/PSAppDeployToolkit: Project Homepage & Forums
Defending against CryptoLocker with Group Policy Software Restriction | Cloud So...
Force remote Group Policy refresh with PsExec and gpupdate - 4sysops
1 For /f "tokens=*" %%a in (c:\tmp\ComputerList.txt) Do psexec \\%%a -i gpupdate
sbilly/awesome-security: A collection of awesome software, libraries, documents,...
Script WSUS Approved Updates Status Report
WSUS Reporting with Powershell Part 3 | Get-Mailbox.net
WSUS Reporting with Powershell Part 2 | Get-Mailbox.net
WSUS Reporting with PowerShell | J. Gregs Brain Corral
Ceph: how to test if your SSD is suitable as a journal device? - Sébastien Han
WSUS Reporting with Powershell Part 1 | Get-Mailbox.net
Getting Ready…Troubleshooting unattended windows installation — Hurry Up and Wai...
WSUS Server HTML Report | Learn Powershell | Achieve More
smb-psexec.nse: owning Windows, fast (Part 1) » SkullSecurity
How To Resolve Active Directory Account Lockouts with PowerShell
How to use the EventCombMT utility to search event logs for account lockouts
But if I say I will not mention Him… » Blog Archive » squidguard logging with pf...
\$SERVER["socket"] == ":80" { \$HTTP["host"] =~ "(.*)" { url.redirect = ( "^/^(sgerror)(.*)" => "https://%1{$redirectport}/$1" ) } }
PowerShell: Searching Through Files for Matching Strings
Performance Tweaks - Proxmox VE
pentestmonkey | Taking the monkey work out of pentesting
PiPresentation_20160214.pptx - Google Drive
CIF 50-DPS | PC card PCI PROFIBUS DP-Slave | hilscher.com
Mondaiji - Life in Japan & Japanese Culture
Alpine Linux | Alpine Linux
Driving Robocallers Crazy With the Jolly Roger Bot | On the Wire
Discover user rights in SharePoint | J. Gregs Brain Corral
Windows file server aliases, NetBIOS over TCP, and Incomplete Documentation | J....
Leo-G/DevopsWiki · GitHub
Mattermost
VGA In Memoriam | Hackaday
VMware KB: Running custom quiescing scripts inside Windows virtual machine with ...
Status Reports - SQLServerCentral
Powershell: List all IIS WebApplications (.net version, state, identity) - Melch...
ULS Viewer is Back From the Dead! - Todd Klindt"s SharePoint Admin Blog
He"s dead, Jim: SharePoint 2013 Search Trobleshooting
Powershell Script to Efficiently Locate Large Files in SharePoint 2010/2013 - Me...
How to use the File Server Capacity Tool (FSCT) on Server 2012 R2 - Ask Premier ...
Fix IIS website hangs and slow loads
%windir%\system32\inetsrv\appcmd list requests /elapsed:10000
asp.net - How prevent CPU usage 100% because of worker process in iis - Stack Ov...
Import-Module WebAdministration $appPoolName = "DefaultAppPool" $appPool = Get-Item "IIS:\AppPools\$appPoolName" $appPool.cpu.limit = 80000 $appPool.cpu.action = "KillW3wp" $appPool.cpu.resetInterval = "00:01:00" $appPool | Set-Item
5 SQL Server White Papers Every DBA Should Read | Strate SQL
Administration | netnerds.net
Automating Your SQL Server Best Practice Reports:The Checks
SQL Server Query Plan Analysis: The 5 Culprits That Cause 95% of Your Performanc...
SQL SERVER – Find the Growth Size for All files in All Databases – Journey to SQ...
SELECT   "Database Name" = DB_NAME(database_id) ,"FileName" = NAME ,FILE_ID ,"size" = CONVERT(NVARCHAR(15), CONVERT(BIGINT, size) * 8) + N" KB" ,"maxsize" = ( CASE max_size WHEN - 1 THEN N"Unlimited" ELSE CONVERT(NVARCHAR(15), CONVERT(BIGINT, max_size) * 8) + N" KB" END ) ,"growth" = ( CASE is_percent_growth WHEN 1 THEN CONVERT(NVARCHAR(15), growth) + N"%" ELSE CONVERT(NVARCHAR(15), CONVERT(BIGINT, growth) * 8) + N" KB" END ) ,"type_desc" = type_desc FROM sys.master_files ORDER BY database_id
Back to Basics: Capturing Baselines on Production SQL Servers - SQLServerCentral
How to Host Multiple Linux Terminals for Viewing and Collaboration with Wemux
Ansible - Clean Formatted Playbooks - EverythingShouldBeVirtual
MDT package now on Chocolatey.org ready for Windows 10! | Keith"s Consulting Blo...
Has my WIM’s changed? – MSitPros Blog
Deleting all network printers on a client with PowerShell – MSitPros Blog
Get-WMIObject Win32_Printer | where{$_.Network -eq "true"} | foreach{$_.delete()}
ESP8266 BASIC - Home
esp8266
Reverse engineering the ARM1, ancestor of the iPhone"s processor
a
The Bro Network Security Monitor
How to Use 8 Useful "Debian Goodies Utilities" to Manage Debian Packages
Aethercast Developing Open Source Display Streaming for Ubuntu | Open Source App...
Aethercast
Automating PowerShell Empire Install | Room362
29 Practical Examples of NMAP Commands for Linux System/Network Administrators
Concurrent Remote Desktop (CRDP) for Windows 10 - DeployHappiness
Philip Flint » Blog Archive » Powershell launch options
Ansible - Debian Based Gotchas - Part-1 - EverythingShouldBeVirtual
Windows Server 2016 - What is the difference between Standard And Datacenter Edi...
Adding a USB power port to a switch for IoT - Designing Electronics in Spain
Microsoft PowerShell Tutorial & Training Course – Microsoft Virtual Academy
Control your Arduino over the Internet using Blynk
How to Add a Hostname Alias for a SQL Server Instance - David Browne"s Web Log -...
Using Friendly Names for SQL Servers via DNS
Stretch"s Hierarchy of Network Needs - PacketLife.net
Build a Large-Screen Command Center with the RPi 2 | Linux Journal
7 DIY Tech Skills to Teach Your Kids, Because Schools Won"t
Generate a parameter list for all SQL Server stored procedures and functions
SQL Server Backup
shaarli · GitHub
ownCloud.org
home | Wiki | Andrew Dolgov / tt-rss | GitLab
dokuwiki [DokuWiki]
Coppermine Photo Gallery
TechNet Diskspd, a Robust Storage Testing Tool, Now Publically Available
Xiaopan OS - Pentesting Distribution for Wireless Security Enthusiasts
Securi-Pi: Using the Raspberry Pi as a Secure Landing Point | Linux Journal
The Death of Surplus | Hackaday
How to Adapt your older SharePoint PowerShell Scripts to Support SharePoint 2016...
OpenALPR - Automatic License Plate Recognition
InfoSec Handlers Diary Blog - Nessus and Powershell is like Chocolate and Peanut...
A Quick Reference of vSphere IDs - Virtu-Al.Net
How to Retrieve Passwords Stored in Windows with PowerShell - Todd Klindt"s Shar...
How to Change Server’s Minrole in SharePoint 2016 - Todd Klindt"s SharePoint Adm...
Perl 6 Advent Calendar | Something cool about Perl 6 every day
Is your network ready for IoT devices?
The security risks of IoT devices
Welcome to kicost’s documentation! — kicost 0.1.12 documentation
KiCad EDA
Welcome to KiPart’s documentation! — KiPart 0.1.13 documentation
Details • Magic smoke enabled 18650 LiPo battery pack. • Hackaday.io
Qora, an open source cryptocurrency | Opensource.com
Friday Fun: Holiday Shopping with PowerShell
16 Excel Formulas that Will Help You Solve Real Life Problems
Sony employees on the hack, one year later.
Freelancers Union :: A Federation of the Unaffiliated
Can Tech Pros Really Win the Gig Economy? - Dice Insights
Why is hi-tech Japan using cassette tapes and faxes? - BBC News
Cable U Training - Communications Estimating
Using Logstash to Analyse IIS Log Files with Kibana
How to upgrade Debian Linux system from Wheezy to Jessie stable release
Knowm.org | How to Set Up the ELK Stack- Elasticsearch, Logstash and Kibana
asp.net - The Report Viewer Web Control HTTP Handler has not been registered in ...
QuickLabel Support & Training Videos
IIS logging to the ELK stack
Install Kibana4, Logstash, Logstash-forwarder and Elasticsearch on Debian 8 Jess...
NXLog Community Edition | nxlog.co
Sending Windows Event Logs to Logstash / Elasticsearch / Kibana with nxlog » Rag...
Sending Windows Event Logs to Logstash - /dev/random
Top 6 Open Source Disk Cloning and Imaging Softwares
lorengordon/ash-windows-formula · GitHub
Getting Started with GNU Radio | Hackaday
Remove Internet Explorer Open or Save Popup | Justin Cooney
The Report Viewer Web Control HTTP Handler has not been registered in the applic...
american fuzzy lop
IIS load balance and failover configuration with Haproxy | Technical Journeys
UsingKVM < CampusGrids < TWiki
Accidental DBA Series - SQLskills.com
Automated Restore Script Output for Ola Hallengren’s Maintenance Solution | Jare...
Script Schedule Ola Hallengrens Maintenance Solution Default Jobs with Powershel...
20 ways to improve SharePoint User Adoption - SharePoint Maven
How to Caulk a Bathtub: 10 Steps (with Pictures) - wikiHow
How to replace blank/space with line break (Alt Enter) in Excel | sitweak
Synchronising Service Applications Between SharePoint Disaster Recovery Farms - ...
How SharePoint Recycle Bin works - SharePoint Maven
Solving the First-Launch Configuration Error with PowerShell"s Invoke-WebRequest...
mathpiper
Postfix Admin - Web based administration interface
Exploring the open development method | Opensource.com
Security Issues - Overview and Examples - Paulo Zemek"s blog - Site Home - MSDN ...
Mastering ASP.NET 5 without growing a beard - Tess blog - Site Home - MSDN Blogs
Mid-Priced Hardware Gets Serious About Software Defined Radio | Hackaday
Your First GNU Radio Receiver with SDRPlay | Hackaday
MQTT
Hackaday Dictionary: The Global Positioning System (GPS) | Hackaday
Grad School Abroad | Graduate Study Abroad | Masters Programs Abroad
Logstash configuration dissection
if [type] == "eventlog" { # Incoming Windows Event logs from nxlog mutate { # Lowercase some values that are always in uppercase lowercase => [ "EventType", "FileName", "Hostname", "Severity" ] } mutate { # Set source to what the message says rename => [ "Hostname", "@source_host" ] } date { # Convert timestamp from integer in UTC match => [ "EventReceivedTime", "UNIX" ] } mutate { # Rename some fields into something more useful rename => [ "Message", "@message" ] rename => [ "Severity", "eventlog_severity" ] rename => [ "SeverityValue", "eventlog_severity_code" ] rename => [ "Channel", "eventlog_channel" ] rename => [ "SourceName", "eventlog_program" ] rename => [ "SourceModuleName", "nxlog_input" ] rename => [ "Category", "eventlog_category" ] rename => [ "EventID", "eventlog_id" ] rename => [ "RecordNumber", "eventlog_record_number" ] rename => [ "ProcessID", "eventlog_pid" ] } mutate { # Remove redundant fields remove => [ "SourceModuleType", "EventTimeWritten", "EventTime", "EventReceivedTime", "EventType" ] } if [eventlog_id] == 4624 { mutate { add_tag => [ "ad-logon-success" ] } } if [eventlog_id] == 4634 { mutate { add_tag => [ "ad-logoff-success" ] } } if [eventlog_id] == 4771 or [eventlog_id] == 4625 or [eventlog_id] == 4769 { mutate { add_tag => [ "ad-logon-failure" ] } } if [eventlog_id] == 4723 { mutate { add_tag => [ "ad-password-change" ] } } if [eventlog_id] == 4724 { mutate { add_tag => [ "ad-password-reset" ] } } if "ad-logon-success" in [tags] { metrics { add_tag => [ "drop", "metric", "ad-logon-success" ] meter => "ad-logon-success-metric" } } if "ad-logon-failure" in [tags] { metrics { add_tag => [ "drop", "metric", "ad-logon-failure" ] meter => "ad-logon-failure-metric" } } }
Practical Technology: Logstash to Nagios - alerting based on Windows Event ID
Using logstash, ElasticSearch and log4net for centralized logging in Windows
Using Powershell to push registry fixes around multiple machines - Stuart Moore
Backup Plex For Ubuntu Reliably - Freedom Penguin
Vyatta 6 IPv6 Zone Policy Example | Long Term Storage
EdgeRouter Lite Configuration - Ubiquiti Networks Community
Japan its own enemy in push to improve cybersecurity ‹ Japan Today: Japan News a...
Escaped...From a Twisted Mind
Proxmox VE Cluster with Ceph - Re-purposing for Hyper-convergence
Ceph
Low Cost Scale-Out Nas for the Office - CephNotes
Corporations and OSS Do Not Mix - cat /dev/brain
A free solution to test VVOLs in my lab, at last! (thanks to EMC) - Virtual to t...
PrisonPC
SAS HBA crossflashing or flashing to IT mode, Dell Perc H200 and H310 | techmatt...
Your Real-World Git Cheat Sheet | Linux.com
Qi Wireless Chargers are now my friend | IdoNotes (and sleep)
Powerbot PB1030
Setting up the Edgemax EdgeRouter Lite (ERLite-3) in a Home Environment | Virant...
The rEFInd Boot Manager
rEFIt
DSHR"s Blog: Cloud computing; Threat or Menace?
Slide Rules were the Original Personal Computers | Hackaday
Hosts Block | Wilders Security Forums
High disk utilization by SQL server - SQL server blogs - Site Home - MSDN Blogs
How to downgrade a SQL Server from 2008 R2 to SQL Server 2005? - SQLAzureKKB - S...
Keeping Linux Clean - Freedom Penguin
How Will the Big Data Craze Play Out? | Linux Journal
C-Media cheap USB sound card
Python for the Data Scientist | Backyard Data Science
Windows Server 2012 / 2012 R2 - Logon restricted to members of Local Administrat...
Neptune RF water meter frequency hopping pattern | Eric"s Blog
Readme
How to Identify Why an Application Pool is Recycling in IIS 7 and DebugDiag 2 Fa...
The system is entering sleep. - Ken Werner - PFE - Site Home - MSDN Blogs
How to Setup Postfix Mail Server and Dovecot with Database (MariaDB) Securely - ...
Generate serie of numbers in SQL Server 2016 using OPENJSON - SQL Server Databas...
Dialects of the IoT - O"Reilly Radar
The first rule of management: Resist the urge to manage - O"Reilly Radar
@JKevinParker: Finally! A Way to Make SharePoint Useful
Celebrate the 200th Birthday of George Boole With Logic
Clint Boessen"s Blog: Active Directory Issues - Network Drives Not Mapping
KMBT_C284e-20151028113010 - SolderingAluminum_WalterFinnegan.pdf
Jan-Piet Mens :: A story of home automation with openHAB, Z-Wave, and MQTT
Jan-Piet Mens :: Who phoned? FritzBox, openHAB, and MQTT know
OpenHAB - Home Automation For Geeks
MySensors -
openHAB
Connect openHAB to hundreds of apps - IFTTT
Running Multiple Linux Servers as KVM Virtual Machines | Steven Gordon
VSAN resync behaviour when failed component recovers - CormacHogan.com
Linked - The Best Employees Stay With Companies That Help Them to Get Better
Lessons From a Decade of IT Failures - IEEE Spectrum
Talent, not shadow IT or hackers, is what keeps CIOs up at night | The Enterpris...
Best Linux Video Editors - Datamation
33 Ways to Feel 10 Years Younger
Cloud Monitoring as a Service | Datadog
Recap: Jim Whitehurst keynote, All Things Open 2015 | Opensource.com
is
Responsive Kanban Board – SharePoint Hosted App | SharePoint Rider
Clint Boessen"s Blog: Enable Firewall Logging on Windows
Benjamin Trigona-Harany - KMail with Maildir
Clean start after a failed migration
Automatic Restarts Make for a Smooth Day - DeployHappiness
Make jenkins Windows service use your preferred JRE « Only Software matters
Introducing the JEA Toolkit Helper - Building Clouds Blog - Site Home - TechNet ...
Check all database email profile in SQL Server by using sysmail_profile
Jon Galloway - 10 Things ASP.NET Developers Should Know About Web.config Inherit...
Jahid"s Blog - Using T-SQL - Database Mail configuration settings and Important ...
Use PowerShell to Find Windows XP Computers Still Alive in Your Active Directory...
sysmail_profile | SQL with Manoj
The Retr0bright Project
A guide to Alternate Access Mappings Basics in SharePoint 2013 | blksthl
10 DNS Errors That Will Kill Your Network -- Microsoft Certified Professional Ma...
The Global Language of Business |GS1 US
Understanding Thermal Dissipation and Design of a Heatsink - slva462.pdf
Why IoT Security Is So Critical | TechCrunch
CCTV Botnet In Our Own Back Yard | Incapsula.com
Audit which network ports are used by a Linux process - Linux Audit
The 101 of ELF Binaries on Linux: Understanding and Analysis - Linux Audit
5 Unique Sites for Finding and Sharing Free Recipes
tlsdate: The Secure Alternative for ntpd, ntpdate and rdate - Linux Audit
20 Awesome Target Shopping Savings Hacks for Dollar Squeezers Like Me! - More Wi...
Best Money Tips: The Keys to Successful Meal Planning
DevOps case study: Rabobank cuts deployment by 60 percent | The Enterprisers Pro...
Install SSH VPN server | panticz.de
Is Online Banking Secure? 5 Risks That Should Worry You
SharePoint 2013 Search: Even Better Best Bets with Exact Matching - Eric Dixon"s...
Why Should You Get a Ham Radio License? | Hackaday
An Improvement to Floating Point Numbers | Hackaday
SQL Admin Script Collection - Lukas Steindl`s BI Blog - Site Home - MSDN Blogs
DSC Resource Kit updates are here! - Windows PowerShell Blog - Site Home - MSDN ...
SharePoint Usage Database in SQL Server AlwaysOn - Build on SharePoint - Site Ho...
The SharePoint Timer Service service terminated unexpectedly - Murat Odabasi - S...
What Are You?
Configuring People Picker in a one-way trust environment with powershell - Murat...
Sorting and rotating photos | Erik Wramner
jhead -n%Y/%m/%d/%f -autorot -exonly *.*
Walmart, Lagging in Online Sales, Is Strengthening E-Commerce - The New York Tim...
Hindsight: What 7 IT leaders wish they had known early in their careers | The En...
.
OpenStack Summit interview with Ian Lewis of Google | Opensource.com
9 habits to make you sound smart - Business Insider
eloquen
Sony Laptop “experiment” – part 3, benchmarks | MX372.net
Sony Laptop “experiment” – part 2, the details | MX372.net
Sony laptop “experiment” | MX372.net
Project: PiDesk – A Raspberry Pi controlled, futuristic desk | Frederick Vandenb...
Cool Tools – The Best Factual Podcasts
TEMPEST: a Tin Foil Hat for Your Electronics and Their Secrets | Hackaday
Teradata releases the power of IoT data
5 New Networking Requirements Driven By Internet of Things and Big Data - Plexxi
OpenHAB Beginner"s Guide Part 2: ZWave, MQTT, Rules and Charting
Getting Started with OpenHAB Home Automation on Raspberry Pi
Is Wall Street Eating Your 401(k) Nest Egg? : NPR
PowerShell/EWS: Searching for and deleting duplicate mailbox folders - EMEA Deve...
Identify queries that consume a large amount of log space in SQL Server | SQL-Tu...
Scheduling Ola Hallengrens Maintenance Solution Default Jobs with Powershell | S...
Clint Boessen"s Blog: Remove all Printers Deployed from a specific Print Server ...
Populating My DBA Database for Power Bi with PowerShell – Databases | SQL DBA wi...
INSS 453 - Internet and Network Security
check_domino Nagios plugin
A Software Developer"s Guide to HTTP Part II - Messages
Forgotten vCenter (vcsa) 5.5 root password | VMware Communities
RasPiHacks.pdf
Behind the Racks | Redundant Load Balancers – HAProxy and Keepalived
Using VMware vSphere/ESXi as a Provider for Vagrant
The programmer"s guide to breaking into management | InfoWorld
10 principles for sane automobile manufacturing - O"Reilly Radar
Theory, practice, and fighting for terminal time: How computer science education...
Dice Data: How Tech Skills Connect - Dice Insights
IBM Error: "This database has local access protection..." when trying to open lo...
How to Pass the CompTIA Linux Certification ?
How To Kill All Users In Specific Database On SQL Server — DBA to DBA
How To: Deploy a Set of Power Settings to ALL Workstations - BrianDagan.com
Azeez"s Notes: TCP Load Balancing with HAProxy
100 open source Big Data architecture papers for data professionals. | Anil Mada...
Python SUDS with Windows Authentication (SOAP) | C. Bess Wonders
NTLM Authenticating Proxy Check Script
How to upgrade to Debian 8 Jessie from Debian 7 Wheezy | Linux Veda
Install HAProxy and Keepalived (Virtual IP) : Severalnines Support
How Stack Exchange gets the most out of HAProxy at Brokenhaze
HAProxy Load Balancing IIS with Sticky Session and SSL | Net Tweets
clomd strange errors, | VMware Communities
What do the fiber terms 9/125, 50/125 and 62.5/125 refer to?
VMware KB: Powering on virtual machines in VMware Virtual SAN 5.5 fails with err...
Automating the setup wizard on the Lotus Notes client
My VSAN Nightmare : vmware
Making the switch from 62.5- to 50-micron fiber - Cabling Install
Evernote and LinkedIn perfect the business card
Contact Management Software & API - FullContact
Installig SQL 2008R2 SP3 failed – Crytographic Error | Thoughts from the recycle...
How Many Virtual CPUs Per VM? « vPivot
DNSCMD Kung Fu | edgeblog
Snapshot: CLOM experienced an unexpected error. Try restarting clomd. | Helweg"s...
Home - Concerto Digital Signage Project
adammcewen | SharePoint Uncovered | Page 2
How to create a SQL Alias 32 bit and 64 bit - Jeremy Taylor | Jeremy Taylor
Important Tips on Router & SMTP mail routing - docview.wss
How to circumvent the 417 Expectation failed behind a Squid proxy
ignore_expect_100 on
23 things you should know about Excel pivot tables | Exceljet
Remote Registry with Powershell (PLUS: Create-ListBox function) | PeetersOnline....
info-beamer pi - A Digital Signage Player for the Raspberry PI
Binary Emotions | Operating Systems
Home - PiWall
ProjectWise News and Blogs | Published by Bill DiGregorio, Bentley Systems
ProjectWise V8i Administrator Client Course Guide
Why Firewalls Won"t Matter In A Few Years - EtherealMind
Using the docker command to root the host (totally not a security issue) // reve...
Tech for Non-Profits
The Pros and Cons of Using NOCs for Wireless E-Mail - gartner_pros_and_cons_of_u...
Error opening file: "The file format differs from the format that the file name ...
Virtual SAN Automatic "Add Disk to Storage Mode" Fails - VMware vSphere Blog - V...
How to Format and Create VMFS5 Volume using the CLI in ESXi 5 | virtuallyGhetto
Clearing datastores in ESXi (Call "HostDatastoreSystem.RemoveDatastore" for obje...
Clint Boessen"s Blog: The Windows Backup engine could not be contacted. Retry th...
Group Policy Object filtering by security group - TechRepublic
Allen-Bradley and Rockwell Software support for Windows 7
Geek of All Trades: Why, When and How to Use Windows 7 XP Mode | TechNet Magazin...
Networking and Using Windows XP Mode - Windows Virtual PC - Site Home - TechNet ...
My VSAN journey - all done! - ESX Virtualization
My VSAN journey - Part 2 - How-to delete partitions to prepare disks for VSAN if...
My VSAN Journey Part 3 - VSAN IO cards - search the VMware HCL - ESX Virtualizat...
Lane"s Tech Blog: SQL Server Reporting Services Service Start Timeout
Fix my IT system: IPv4 DNS records removed from DHCP clients with IPv6 Enabled
sql server - How To Profile Stored Procedures - Database Administrators Stack Ex...
Less Than Dot - Blog - Creating a baseline for SQL Server
EFF"s Top 12 Ways to Protect Your Online Privacy | Electronic Frontier Foundatio...
Sql Server : How to check if a user define table type exists using query (TSQL) ...
user define table type
Josh Steimle: Speaker, Writer, Entrepreneur
The Promise of the Internet of Things and the Web of Things - Introduction to th...
The Rise of the Internet of Things Offers the Promise of Impactful Innovation
The Promise and the Peril of the IoT - Peak 10
Three Ways to Convert Text-Based Numbers to Values | AccountingWEB
The Code Log | Quietly Alive!
The Promise of IoT | Features content from Global Purchasing
The 54 Excel shortcuts you really should know | Exceljet
The Promise and Challenges of an Internet of Things (IoT) World
FloorPlanner
Holding Down 0 (zero) Key To Recovery Screen Doesn... - TOSHIBA FORUMS
Toshiba,press 0 to recovery
How to boot from USB on ASUS X551CA? - Super User
Under Security disable Secure Boot Control Under Boot disable Fast Boot, then enable Launch CSM, then enable Launch PXE OpROM Save changes and restart and press the esc key and choose boot from USB. If that doesn"t work...at least you have somewhere to start looking.
Server Service: IRP Stack Size - Monitors - Public MPWiki
IRPStackSize
[vdi2qcow2, qemu] How to Convert vdi to qcow2 - Google Docs
How To Install Primavera P6 15.1 standalone with SQL Express
Primavera
Simon Sinek: Why good leaders make you feel safe | TED Talk | TED.com
MSDgen - Global Regulatory Compliance Suite - 3E Company
This hilarious Cisco fail is a network engineer"s worst nightmare
Create Interactive HowTo"s for the Web - whatfix
Puppetized mFi controller
Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution
MobaLiveCD - Run your LiveCD on Windows
Security Onion
Pentoo
Sharegate"s SharePoint Blog | Sharegate
Configure Product Activation using Group Policy or the Licensetoolcmd - SELECTse...
Browse by Tags - Hey, Scripting Guy! Blog - Site Home - TechNet Blogs
Using the Time Domain Reflectometer (TDR) | OSP Magazine
Start a K2 process from PowerShell | sparepoint
Automated Restore Script Output for Ola Hallengren’s Maintenance Solution - SQLS...
Why IT staff are unhappy at work
Three ways to design your DFS Namespaces - Jose Barreto"s Blog - Site Home - Tec...
Using Domain Controller Account Passwords to HashDump Domains | Room362
AWS in Plain English
How to: Set Tomato Firmware for Wireless Client Modes
Print all attachments from documents – Kwintessential Notes
Re: Saving attachments from multiple e-mails.
This tiny "e-mailable" solar house snaps together like a 3D puzzle without a sin...
Our World in Data — Visualising the Empirical Evidence on how the World is Chang...
OpenNTF.org - Print attachments with OLE Aut
How to Bypass and Reset the Password on Every Operating System
Updated UniFi Repo info/APT howto - Ubiquiti Networks Community
Scheduling Ola Hallengrens Maintenance Solution Default Jobs with Powershell - S...
Power Bi, PowerShell and SQL Agent Jobs | SQL DBA with A Beard
Jenkins, Docker, Proxies, and Compose | Riot Games Engineering
WaveGuard WG-UB-RM1 – Indoor enclosures – ISP Supplies
Home : Geographic Information : U.S. Bureau of Labor Statistics
tuptime - Shows Historical and Statistical Running Time of Linux Systems
How to Use Ansible Playbooks to Automate Complex Tasks on Multiple Remote Server...
The Local Frontier: Data Centers Coming to a City Near You
Million-Dollar Words - million-dollar-words-by-godin-and-mandell.pdf
The eight critical issues holding back IT
PowerShell Blog - Mirror-Database
InfoSec Handlers Diary Blog - Data Visualization,What is your Tool of Choice?
8 Useful Commands to Monitor Swap Space Usage in Linux
Hash Tables—Theory and Practice | Linux Journal
How to map your mouse on Linux
Choosing between OneDrive for Business and SharePoint
ThingWorx Developer Zone | ThingWorx
Why the Internet of Things isn"t the same as the new hardware movement - O"Reill...
Joe Biron on what"s new about the IoT - O"Reilly Radar
Linux Text to Speech Tool Reaches Beta | FOSS Force
How to Make Your Graphs & Tables Look More Professional
SharePoint High Trust Add-In Provider Hosted Quick Start/Walkthrough - Danimal52...
Team Foundation Server 2015 upgrade planning - Premier Developer - Site Home - M...
Automate SSRS Report Generation using PowerShell - Canadian Developer Connection...
Forrest M. Mims III
GnuCOBOL (formerly OpenCOBOL) / Discussion / Forums
IonicaBizau/node-cobol · GitHub
OpenCobolIDE/OpenCobolIDE · GitHub
Open Source GPS Tracking System - Traccar
How to protect your network in the BYOD era
BYOD and BYOA (Bring Your Own Application) have become natural parts of our day to day lives. As this trend continues to grow, the
PlantUML : Open-source tool that uses simple textual descriptions to draw UML di...
Get started with Sweet Home 3D on Linux
Create Your Own Video Sharing Website using "CumulusClips Script" in Linux
Multiheaded NVIDIA Gaming using Ubuntu 14.04 KVM - Puget Custom Computers
Active Directory Change Control and Other Advanced Adaxes Features - DeployHappi...
The 20 Websites You Need to Learn Math Step by Step
SQL Script to set all Log and Database files to fixed size absolute growth value...
Discovering SSRS Report Parameters using PowerShell - Canadian Developer Connect...
Script to defragment SQL Server Log Files – improves DML and Backup/Restore perf...
Docker: Containerize your Startup – Your journey from virtualization to Containe...
Reading - The Internet of Things: It"s Not Just Data Collection, It"s Evidence
A Smattering of Group Policy and Modicum of AD - Paranoid Humanoid - Site Home -...
FreedomBox/LeavingTheCloud - Debian Wiki
How Floods in Thailand Made AWS Rethink Its Supply Chain • Data Center Frontier
The Linux Works: Linux Security: Lock Down a New System Immediately
5 ways to learn SharePoint - SharePoint Maven
Raspbian Jessie Lives Up to the Hype | FOSS Force
Debug Diagnostics Tool v1.2 is now available
Improve Database Performance Without Changing Code
Money moves for graduates: How to set up a budget
Building Carrier-Grade Cloud Infrastructure « ipSpace.net by @ioshints
Sharepoint User Profile context Filter webpart using powershell - rakhiguha - Si...
How to use BizTalk throttling feature to achieve throughput control like receive...
CoreOS is Funding Kubernetes Development on AWS - The New Stack
Linux Foundation straps a rocket on Real Time Linux ·  LinuxGizmos.com
How to Create Multiboot USB Stick With Veeam Recovery ISOs for Different Systems...
A Brief History Of Android Easter Eggs - #NatAndLo Ep 8 - YouTube
DIY 110v Temperature Controlled Soldering Station | PCB Smoke
Agile team evaluation - Eric Gunnerson"s Compendium - Site Home - MSDN Blogs
Sharepoint Query String Filter webpart using powershell - rakhiguha - Site Home ...
Ancient SCO Unix Crash
Using KDE Connect to Sync your Android Device with Your Linux Computer
Configure Syslog for VMware ESXi via vMA | Geek and I
Microsoft Patchchart
How to Install and Use Linux Malware Detect (LMD) with ClamAV as Antivirus Engin...
eBook_SQL_Server_Setup_Checklist.pdf
Migrate print server script
Save print server settings script
SPSWakeUp - Wake Up Your SharePoint ! - Home
Quick way to query IIS logs for 40x and 50x requests - Peter Hahndorf
Sysads Gazette Split SQL TempDB per number of Processor Core - Sysads Gazette
Development With A Dot - SharePoint Field Reference
Get-SPScripts : PowerShell Scripts for SharePoint
Demystifying SharePoint Performance Management Part 11 – Tales from the Microsof...
Demystifying SharePoint Performance Management Part 10 – More tools of the trade...
Demystifying SharePoint Performance Management Part 9 – Don’t believe everything...
Demystifying SharePoint Performance Management Part 8 – More on SQL and SQLIO - ...
Demystifying SharePoint Performance Management Part 4 – Making use of RPS - Clev...
Demystifying SharePoint Performance Management Part 7 – Getting at Latency, IOPS...
Demystifying SharePoint Performance Management Part 6 – The unholy trinity of La...
Demystifying SharePoint Performance Management Part 2 – So what is RPS anyway? -...
Demystifying SharePoint Performance Management Part 5 – So what is latency anywa...
Demystifying SharePoint Performance Management Part 3 – Getting at RPS - CleverW...
Perfmon Counter Templates – SharePoint Server, Project Server and SQL Server | S...
Demystifying SharePoint Performance Management Part 1 – How to stop developers b...
reSP
Four Tips for SQL tuning for SharePoint Part 2 - Shrink DB - SQLPFE.IL - Site Ho...
Four Tips for SQL tuning for SharePoint Part 1 - MAX DOP - SQLPFE.IL - Site Home...
SQL Alias PowerShell script - SQLPFE.IL - Site Home - TechNet Blogs
SQL Protocol How to secure and disable unnecessary protocol with a Power Shell s...
Four Tips for SQL Tuning for SharePoint Part 3 TEMPDB - SQLPFE.IL - Site Home - ...
A trip down Unix memory lane | ITworld
30 years a sysadmin | ITworld
Hard Drive Configurations for SQL Server
The Technology chronicle!!!: DHCP Dora process
SharePoint Foundations 2013 Offline Part 2 ( Install Prerequisites ) - the Conne...
SharePoint Foundations 2013 Offline Part 1 ( Download all Prerequisite software ...
LXC: create Ubuntu Trusty container | panticz.de
Securosis Blog | Building Security Into DevOps: Security Integration Points
Automatic motion trail effect with OpenCV | en art | ao2.it
Managing Printers with Group Policy, PowerShell, and Print Management
VMware KB: Extracting the drivers from VMware Tools bundled with VMware Workstat...
Create UEFI disc | panticz.de
Using Group Preferences in AD to Install and Map Network Printers - IT Knowledge...
The Invisible Things
Qubes OS Project
How to Monitor Progress of (Copy/Backup/Compress) Data using "pv" Command
Dealing with Boundary Issues | Linux Journal
Storage performance troubleshooting with ESXTOP [Guide] - ESX Virtualization
iOS 9"s WiFi Assist is killing your data plan
SharePoint- Export/Import Managed Metadata Terms through CSV - Thiru"s SharePoin...
Q Light Controller
Home: LinuxMCE home automation
Avidemux - Main Page
Mumble, the open source VoIP solution
OZW Utilities
- The Internet of Things is powered by Z-Wave.
Active Directory: How to update User thumbnail photo using Service Account - rak...
Building the Ultimate IKEA Bed | Hackaday
Disney Research » Visible Light Communication
Better approaches to unit testing PowerShell scripts that call SharePoint cmdlet...
Companies grow using the power of the cloud
How bimodal IT is helping companies hire and retain workers | CIO
Vagrant Simplified | Linux Journal
All Things Open interview with Seth Vargo | Opensource.com
How to trigger commands on File/Directory changes with Incron on Debian
Protecting your Linux system | Opensource.com
Hesitant to embrace continuous deployment? Start small | The Enterprisers Projec...
Windows Server 2003 Migration (Part 1) - coping when reality interferes with the...
MSDN Blogs
Tracking Administrator Sessions in Windows Environments - /dev/random
Fragmentation Needed: Just some quick points about DHCP
Make a Weather Station with a Raspberry Pi 2 - Raspberry Pi Blog
VSAN: As Always, Latency Is the Real Killer « ipSpace.net by @ioshints
Version Control Guidance – Frequently Asked Questions - Visual Studio ALM Ranger...
The Security of Virtual Infrastructure
Bluetooth Hacks | Linux Journal
RainLoop Webmail
SquirrelMail - Webmail for Nuts!
Roundcube - Free and Open Source Webmail Software
Flowblade
Light Table
My VMworld Session - VSAN Monitoring & Troubleshooting - now available - CormacH...
Descriptive Statistics - Initial Evaluation of the Data - Carpe Datum - Site Hom...
Leveraging Internet Explorer Enterprise Tools to More Quickly Upgrade to IE11 - ...
The (Amateur) Data Science Body of Knowledge - Carpe Datum - Site Home - MSDN Bl...
New extended event to track backup and restore progress - SQL Server Team - Site...
PowerShell Summit Europe 2015 Presentations
Delayed Folder Redirection File Screens with PowerShell - DeployHappiness
PA-Gapps - Community - Google
Inside Amazon"s Cloud Computing Infrastructure
BYOD adoption slowed by policy issues
VSAN 6.1 New Feature - Problematic Disk Handling - CormacHogan.com
DFS Replication Improvements in Windows Server 2012 - The Storage Team at Micros...
Step-By-Step: Migrating a 2003 file server with Microsoft File Server Migration ...
51 Useful Lesser Known Commands for Linux Users
Linux and the Internet of Things | Linux Journal
FileBot - The ultimate TV and Movie Renamer / Subtitle Downloader
HuePl: A Perl command line controller for the Philips hue lighting system
Emby - The open media solution
How to Record and Replay Linux Terminal Sessions using "script" and "scriptrepla...
How to Setup SSH Keys on a Linux System - Freedom Penguin
Continuous Delivery: Getting Started | Linux.com
TECH BULLETIN - 109A Soldering Tip Care and Use.pdf
Best Raspberry Pi Server Linux Distribution | TechFindings
ExTiX :: The Ultimate Linux System | All about ExTiX
Philip Flint » Blog Archive » Common PowerShell commands for Hyper-V
Philip Flint » Blog Archive » Delaying DHCP Offer (80/20 rule)
How To Wakeup Backup Nas Server and Mirror Files Using Rsync in Linux
Open Tree of Life
The Scribus Community - ScribusStuff.org
gLabels
Musing: Skipping 10Gig Ethernet and Going Direct to 25Gigabit ? - EtherealMind
per port basis is about 1.4 times that of 10GbE. Some vendors may charge more but t
TidBITS: Learn iOS 9 Fast with “iOS 9: A Take Control Crash Course”
Hardware Virtualization in Microcontrollers | Hackaday
In-Place upgrade to Team Foundation Server (TFS) 2015 from TFS 2013 - Microsoft ...
Version Control Walkthrough (Branching Strategies) Part 2 - Development Isolatio...
MSDN Blogs
The Linux Setup - Jim Whitehurst, President/CEO,... - My Linux Rig
Using Command Line Aliases – Frequently | Freedom Penguin
Assisted Serendipity – Fostering Peer to Peer Connections in Your Organization -...
Securosis Blog | Pragmatic Security for Cloud and Hybrid Networks- Introduction
IBM Using the Lotus Notes Install Cleanup Executable (NICE) tool - United States
Home Page - ABC-Deploy
DiskSpd, PowerShell and storage performance: measuring IOPs, throughput and late...
Create a W3WP memory dump, quick and easy - benjamin perkins - Site Home - MSDN ...
psexec -i -s cmd.exe - Chris Sugdinis" Configuration Manager Blog - Site Home - ...
psexec -i -s cmd.exe
Using Ola Hallengrens SQL Maintenance Scripts (1).pdf
undefined
Configuring Shared IPMI Ports on Supermicro Servers for the Home Lab - Wahl Netw...
Using PowerShell Desired State Configuration to build the first domain controlle...
Deploy Active Directory with PowerShell DSC (a.k.a. “DSC-PROMO”) - Goatee PFE - ...
TagSpaces - Organize Your Files
LasLabs | Initial Configuration - Ubiquiti EdgeRouter Lite - LasLabs
Create a Guest VLAN with a Ubituiti Edgerouter Lite
EdgeOS CLI Primer (part 1) - Ubiquiti Networks Community
Configuring Interface Based Firewall on the Vyatta Network Appliance | Knowledge...
The Ubiquiti EdgeRouter: Configuring this extremely low-cost, enterprise-grade r...
7 presentation tips from the 2015 world champion of public speaking - Agenda - T...
SolarBeat
Home - Ultimate Guide to Logging
Teach Scrum through games - Scrum Simulation with LEGO
NitroShare — Send Any File to Any Device
Debian: Install Cacti | panticz.de
SharePoint Navigation Best Practices - SharePoint Maven
SharePoint 2013 server shows "Upgrade Required" because AppFabric 1.1 was uninst...
The Jewish Fruitcake: Honey Cake Is A Sweet And Stodgy Tradition : The Salt : NP...
Cleaning temporary ASP.NET files - Octopus Deploy
Using PowerCLI to assist in right-sizing Memory for VMs | vNoob
PowerCLI & vSphere statistics - Part 1 - The basics - LucD notes
Upgrading from SharePoint 2010 to SharePoint 2013 - Fadi Abdulwahab"s Blog - Sit...
Think your meeting"s important? 25 years ago, this one spawned Wi-Fi | Network W...
Vic Hayes
Internet Crime Complaint Center (IC3) | Internet of Things Poses Opportunities f...
Resistance is… There’s an Augmented Reality App for That! | Hackaday
5 Utterly Fascinating History Education Resources
Containerize Your Startup: Image Management–Part 3 - Canadian Developer Connecti...
Prepare for Team Foundation Server (TFS) 2015 Upgrade - Microsoft Team Foundatio...
SharePoint Data Retention Policy - rakhiguha - Site Home - MSDN Blogs
Seth"s Blog: How idea adoption works--The Idea Progression
Law Firm IT Security: Unsolvable Problem or Risk Management Process? | Business ...
The 7 Best Web Apps For People Approaching Retirement
How to Run ISO Files Directly From the HDD with GRUB2
Effective NTLM / SMB Relaying | Room362
Why Windows Server Containers and Why You Need to Look at Containers? Hands on… ...
Simon Sinek: Why good leaders make you feel safe | TED Talk Subtitles and Transc...
Simple USB Power Meter | Hackaday
10 Tools to Make a Bootable USB from an ISO File
How To Install Puppet To Manage Your Server Infrastructure | DigitalOcean
pfSense Without Internets | Room362
How to Use PowerShell to Fix Duplicate User Principal Name for On-Premises Activ...
Whatever for free: Tuning Windows Server 2003 TCP/IP Stack
Top Ten IIS Configuration Tips - byronpate.com
Tuning IIS 8.0 | Web Application Performance - Best Practices
Puppet Network Device Management | Puppet Labs
netem
NIST SP 800-12, An Introduction to Computer Security : the NIST Handbook - handb...
How to manage SharePoint Implementation
The real confusion bug - Mostly True - Site Home - MSDN Blogs
SentinelOne - Next Generation Endpoint Protection
FreeDV | HomePage
Prevent SQL Server Reporting Services Slow Startup
Download Reporting Services Migration Tool from Official Microsoft Download Cent...
Microsoft SQL Server Product Samples: Reporting Services - Home
Linux Foundation Sysadmins Open-Source Their IT Policies | Linux.com
The True Internet of Things | Linux Journal
Life and layoffs - I. M. Wright’s “Hard Code” - Site Home - MSDN Blogs
https://www.loweslink.com/pubdocuments/edi860ProcurementImpGuide.pdf
The many (surprisingly realistic) hacks of "Mr. Robot"
A brief overview of the new Virtual SAN 6.1 - CormacHogan.com
VMware VSAN 6.1 Details - ESX Virtualization
Setting Up High-Performance HHVM and Nginx/Apache with MariaDB on Debian/Ubuntu
Coffee Break 16 – Using Windows PowerShell to Mark and Compare - Microsoft Dynam...
droppeDPackets » Patch more, patch faster
20 Command Line Tools to Monitor Linux Performance
Desired State Configuration(DSC) for SQL Server - Troy Ault"s Blog - Site Home -...
CloudPhysics - Data-Driven Insights for Smarter IT
How to Defragment Linux Systems - Make Tech Easier
1401_08-12_mickens.pdf
Save Encrypted Passwords to Disk with PowerShell - Todd Klindt"s SharePoint Admi...
An In-Depth Look at What"s New in Primavera P6 15.1
John Conway"s Life in Game | Quanta Magazine
HP announces mt42 -- an AMD-powered Windows 10 IoT Enterprise mobile thin client
What"s new in SharePoint 2016? - Azure, SharePoint & More - Site Home - MSDN Blo...
Ddrescue-GUI: Front-End for Ddrescue Command-line Tool - Ubuntu Portal
Install PXE Server And Configure PXE Client On CentOS 7 | Unixmen
How to configure virtual hosts in Apache HTTP server - Xmodulo
Microsoft Advanced Threat Analytics in now GA! - Active Directory Blog - Site Ho...
Microsoft Advanced Threat Analytics
Designing at the intersection of disciplines - O"Reilly Radar
The Big Picture: A nebula with the grace of a butterfly
Butterfly Nebula
Why I Hate ITIL So Much - EtherealMind
Why everyone must play a part in improving IoE privacy | The Enterprisers Projec...
10 Time-Management Skills That Will Help Your Kid Win at School
Veeam Whiteboard and PowerShell
Updated PowerShell Formatting Functions
Create Your Custom PDF Template for Planning Anything
Partitioning - ArchWiki
Partitions: Planning Your Linux Installation — Guide to Linux for Beginners
New HTML5 Embedded Host Client for ESXi | virtuallyGhetto
SharePoint Department Site Example - SharePoint Maven
How to add a Video in SharePoint - SharePoint Maven
4 IT leaders discuss how they are driving digital transformation | The Enterpris...
Using Cloud storage safely – encrypt & sync with Ubuntu | Scratch Uncle Gurrier"...
Buying cheap Arduino clones | TechFindings
Doing Astronomy with Python | Linux Journal
Texas Linux Fest: Interview with Robert Booth, SaltStack | Opensource.com
Mhddfs - Combine Several Smaller Partition into One Large Virtual Storage
51 Open Source Tools for the Internet of Things - Datamation
Spectrum Painting on 2.4 GHz | Hackaday
Handling VSAN trace files when ESXi boots from a flash device - CormacHogan.com
ACM Classic Books Series
A Deeper Look: Patching SharePoint 2013 Farms - Build on SharePoint - Site Home ...
Teeing Up to the Clipboard
From Skateboards to Drug Pumps, Welcome to Our Hackable Future - The Daily Beast
8 Formatting Tips for Perfect Tables in Microsoft Word
Creating network diagrams with Inkscape | Simplebeian
Accessing your modem from OpenWRT Router | Simplebeian
What Is Cumulus Linux All About << Data Center Fabric Architectures << ipSpace W...
Interesting Dell iDRAC Tricks – The Lone Sysadmin
The 10 Best Pieces of Cooking Advice From Julia Child
Docker: Containerize your startup! - Canadian Developer Connection - Site Home -...
Setting up an IIS Site Using PowerShell - Canadian Developer Connection - Site H...
What is this thing called Big Data? - PowerBI - Site Home - MSDN Blogs
Steps to check the code coverage of a web application via command line - Microso...
6 Musical Projects for Arduino Beginners
ESXi Commands List - Getting started - ESX Virtualization
Broadcast Your Own FM Radio Station, with a Raspberry Pi
TFS Upgrade - Long Lead Preparations - Visual Studio ALM Rangers - Site Home - M...
The Value of a Hacked Email Account — Krebs on Security
TFS 2015 released (RTM of Team Foundation Server 2015 available now) - Microsoft...
Buying a router for OpenWRT | TechFindings
Snapwatcher For VMware - Product Review - ESX Virtualization
Visual Studio 2015 FAQ - The Visual Studio Blog - Site Home - MSDN Blogs
TFS Upgrade - Short Lead Checklist - Visual Studio ALM Rangers - Site Home - MSD...
5 Career Tips I Learned From John Chambers and Cisco - EtherealMind
Use different wallpapers on multiple monitors in Linux - blackMORE Ops
Convert system information into DSC format | sepago
Rapid Provisioning Linux VDI Desktops with Horizon View | Long White Virtual Clo...
Samba Server Installation on Debian 8 (Jessie)
How to set up TFS 2015 in a dual server configuration - Microsoft Application Li...
TFS Upgrade - New Elements of TFS 2015 that influence an upgrade - Visual Studio...
Team Foundation Server 2015 Now Available - Somasegar"s blog - Site Home - MSDN ...
Unit testing with DNX (ASP.NET 5) projects - .NET Web Development and Tools Blog...
5 YouTube Videos To Get Really Excited About Smart Homes
7 Reasons Why The Internet of Things Should Scare You
Cooking for Diabetics: How to Find Safe and Delicious Recipes
good-and-cheap.pdf
lucadentella.it – irrighino
How To Run Cronjob Script On The Last Day Of a Month
SharePoint Permission Levels explained - SharePoint Maven
UNDERGROUND TOUR
Windows Support — Ansible Documentation
How to activate Windows 10"s secret God Modes
What Is Multihoming and What Do You Need to Set It Up?
5 Things to do before the SharePoint 2016 Beta Drops - Todd Klindt"s SharePoint ...
Operating System Version (Windows)
12 reasons folders in SharePoint are a bad idea | SharePoint Maven
Handling Deadlocks in SQL Server
InfoSec Handlers Diary Blog - Your Security Policy Is So Lame
Will violation of your security policy eventually lead to the policy violator realizing their opportunity to violate security policy at a different company? It should - Otherwise your document is really a suggestion and not a policy.
Useful Samba Networking Commands | toasterz
What should my backup strategies be for system databases? - SQLAzureKKB - Site H...
How shadow IT threatens the enterprise and what to do about it
Jailhouse | Linux Journal
10 Job Interview Questions for Linux System Administrators | Linux.com
Best Practices to Protect You, Your Network, and Your Information
Install Elastix Unified Communication Server | Unixmen
Command Prompt vs. Windows PowerShell: What"s the Difference?
CubCadet CC500 Electric Mower – LiPo Battery Conversion | PlastiBots
Multi-Terabyte SQL Server Database Backup Strategies for Azure Virtual Machines ...
DBCC CHECKDB - Good to know! - SQLAzureKKB - Site Home - MSDN Blogs
EXEC sp_msforeachdb "DBCC CHECKDB(""?"") WITH ALL_ERRORMSGS, EXTENDED_LOGICAL_CHECKS, DATA_PURITY" If you feel that you need to run the DBCC CHECKDB on the MDF (live, not snapshot) then use TABLOCK.
SQL Server Agent jobs collecting useful information, how to save them? - SQLAzur...
9 Ways to Organize Your Office With These 3D Printables
Using PowerShell Direct for Script Locking - Ben Armstrong - Site Home - MSDN Bl...
PowerShell Direct - handling authentication for better scripting - Ben Armstrong...
The Best Free eBooks to Teach Yourself About Personal Finance
ho
Soylent - Free Your Body
Maximize Evernote with 5 Powerful Features
.NET Framework setup verification tool, cleanup tool and detection sample code n...
PowerShell Direct & Waiting for an IP Address - Ben Armstrong - Site Home - MSDN...
# Wait for DHCP while ((Get-NetIPAddress | ? AddressFamily -eq IPv4 | ? IPAddress -ne 127.0.0.1).SuffixOrigin -ne "Dhcp") {sleep -Milliseconds 10}
Celestia: Home
Stellarium
Patching in 2 days? - "tell him he"s dreaming" - SANS Internet Storm Center
Slides and Scripts from SharePoint Cincy 2014
Default Search Index File Location for SharePoint 2013
LibreQDA public release | Tryolabs | Blog
Secure Server Deployments in Hostile Territory, Part II | Linux Journal
Secure Server Deployments in Hostile Territory | Linux Journal
Audio Programming with Open Source Languages - Linux Links - The Linux Portal Si...
Capital One Out to Display its Geekdom with Open Source DevOps Dashboard - The N...
How to Update Linux Kernel for Improved System Performance
Tips and Considerations When Creating Virtual Machines in Azure
How to install a Raspberry Pi SMS Server
Mr. Robot TV Show Now Uses BackTrack Linux"s Successor, Kali Linux, for Hacking ...
Pydio - An Open Source Alternative To Dropbox - Unixmen
Slides and Scripts from SharePoint Cincy 2015
Be Careful Installing .Net 4.6 / Visual Studio 2015 with SharePoint 2013 (July 2...
How to update Debian or Ubuntu Linux containers (lxc) VM
SOUPS - Symposium On Usable Privacy and Security
Building a commandline interface with boost::program_options - By Ulrich Krause ...
Building ONTF DomBackUp with TeamCity - By Ulrich Krause - eknori.de
How the Experts Protect Themselves Online (Compared to Everyone Else)
InfoSec Handlers Diary Blog - Patching in 2 days? - "tell him he"s dreaming"
SoftLayer launches new pricing and configuration options | IdoNotes (and sleep)
Tiny Yocto-ready ARM COM supports industrial temps ·  LinuxGizmos.com
Cloud security myths busted
Self forming teams at scale - Brian Harry"s blog - Site Home - MSDN Blogs
Dukto - An Easy, Multi-platform File Transfer Tool - Unixmen
Enterprise cloud economy is booming
vSphere Performance Improvements - New PDF - ESX Virtualization
Compare zones between two Nameserver | panticz.de
Performance Baselines and Benchmarks For SQL Server
Getting baseline and performance stats – the easy way. – Simple-Talk
Shaps/haproxy_check_mk
Osquery: Introducing query packs | Engineering Blog | Facebook Code | Facebook
Licensing and packaging changes for TFS 2015 - Brian Harry"s blog - Site Home - ...
Measure that Folder with PowerShell Revisited
Error while connecting to SQL Server – “Could not connect because the maximum nu...
Arduino Project Ideas for an Automated Home
An introduction to testing, part 3: Different types of tests · Paul Graydon
Childhood Tech Exposure Is Slowly Killing The Keyboard | Hackaday
What are the perks that employees want the most?
High-availability with HAProxy and keepalived on Ubuntu 12.04 | Tony"s press
Backups with rsnaphot to external USB drives | workaround.org
21 Surprising Uses for Vinegar
Give Your Raspberry Pi Night Vision With the PiNoir Camera | Linux.com
Using Huginn Scenarios to Save Money - andrew makes things
Virtualized Exchange Storage: VMDK or RDM or…? | Virtualize Business Critical Ap...
Doing It Wrong: Virtualizing SQL Server - Thomas LaRock
The SANMAN: vSphere"s Virtual CPUs - Avoiding the vCPU to pCPU ratio trap
SQL Server 2008 Management Data Warehouse
Automate and Improve Your Database Maintenance Using Ola Hallengren"s Free Scrip...
BlackbaudKnowHow.com: For Blackbaud Software Users » Our Recommended SQL Server ...
Free SQL Server tools that might make your life a little easier
Create, review and deploy code together with GitLab open source git repo managem...
4 HTTP Security headers you should always be using | ibuildings
Building an open source Nest — Particle Blog
Technology is run by the wrong people | Michael O. Church
Polychart.JS
Satya Nadella on a Mobile-First, Cloud-First World - J.D. Meier"s Blog - Site Ho...
How To Get Smarter By Making Distinctions - J.D. Meier"s Blog - Site Home - MSDN...
Application monitoring tools are often underused
PowerShell script to deploy/rebuild an ASP.NET Web application (a.k.a. Building ...
PowerShell Script: IIS Log Files Cleanup
Vicky Koul: IIS Powershell: Script To delete all sites
foreach ($i in get-childitem IIS:\Sites\ -Name) {remove-item ("IIS:Sites\"+$i) -R}
Welcome to Bob Aiello"s CM Best Practices Website!
Learn X in Y Minutes: Scenic Programming Language Tours
Orchard | Instant Docker hosts in the cloud
ClusterHQ: The Importance of Container Plugins for Extending Docker"s Functional...
Multilateration (MLAT) now available on PiAware! : ADS-B Flight Tracking
How to manage the IEHarden Setting for users using Group Policy Preferences(GPP)...
How can I configure Proxy AutoConfigURL Setting using Group Policy Preference (G...
A Complete List of Windows Development Tools @ Scott Ge
LAPS and permission to join computer to domain - LAPS - Local Administrator Pass...
C6100 IPMI Issues with vSphere 6 | vNetWise
Functional Python Made Easy - Hackflow
CloudRouter® | Router Distribution for the Cloud
Systemd - What You Need to Know - Make Tech Easier
Freshen stagnant skills with training and certifications | Opensource.com
"Recruiters are in hot pursuit of Linux talent. As business continues its tectonic shift to an open source model, employers are hungrier than ever for skilled Linux professionals who can demonstrate their competencies."
Zeal - Offline Documentation Browser
Key principles of an open organization | Opensource.com
Using the New iproute2 Suite | FOSS Force
PiDrive A Low Power Raspberry Pi mSATA Solid State Disk (SSD)
HOW TO: Recreate SQL Server Statistics In a Different Environment - Thomas LaRoc...
The Dinner Party Collective | Reinvigorating the Delicious Lost Art of Dinner Pa...
30 Trendy Internet Slang Words and Acronyms You Need To Know To Fit In
Restore content from Backed Up DBs -SharePoint 2013 - Part 2 - ashishranjan - Si...
Restore content from Backed Up DBs -SharePoint 2013 - Part 1 - ashishranjan - Si...
SharePoint 2013 - PSCONFIG is mandatory after installing July 2015 CU for ShareP...
These 9 Cloud Computing Skills Could Give You The Next Career Jump
OpenFire Microsoft Active Directory Security = Awesome Enterprise Instant Messen...
The WTF economy is transforming how we do business - O"Reilly Radar
Packer: In 10 minutes, from zero to bootable VirtualBox Ubuntu 12.04 | kappataum...
Restore Gene Version 3 – Technical Documentation | Paul Brewer
5 ways to keep your financial information safer from hackers
10 of the Coolest Sayings About Saving
Deduplication: Why Computers See Differences in Files that Look Alike | Ball in ...
How to Turn Your Android Phone or Tablet Into a Mouse and Keyboard for Windows
Software
HomePage - Wireless Battle of the Mesh
InstallCDCustomization/PreseedExamples - Community Help Wiki
partitioning - How do I preseed multiple partitions on one disk; /tmp /data /usr...
expert_recipe string
Notes on using expert_recipe in Debian/Ubuntu Preseed Files | Semi-Empirical She...
Script Use PowerShell to Migrate SQL Server Instances (db, logins, jobs, etc)
What is the best combination for your SPF record, DKIM record, and DMARC record?...
Check manual page of ipmi
SuperMicro - Nagios Exchange
A Simple Bash Script for Automated Backups | System Administration Desk
Puppet vs Chef vs Ansible - Probably
Comparison of Puppet and Ansible | Ifblog (ponderings 2.0)
Why "ASAP" is a craptastic deadline - SysAdmin1138 Expounds
Sysadmin Notebook: Removing hosts from backuppc
Sysadmin Notebook: Purge Removed packages
dpkg --list |grep "^rc" | cut -d " " -f 3 | xargs -r sudo dpkg --purge
Business Rules, Security Roles, and Logging - A Deeper Look at Adaxes for Active...
Skilled for Life - J.D. Meier"s Blog - Site Home - MSDN Blogs
Import / Deployment / Execution of SSIS packages fails after you migrate SSISDB ...
Moving from Zabbix to Check_MK · Paul Graydon
Trying out Ganeti with Vagrant
Virtual LCD Using Python | Hackaday
Grandstream Networks, Inc :: GVC3200
The history of Windows
Security baselines for Windows 8.1, Windows Server 2012 R2 and Internet Explorer...
Enterprise-class Wi-Fi for the SMB: 15 best practices from the field
Home Automation with Raspberry Pi | Linux Journal
How to automate VM deployment from large USB keys using ESXi Kickstart? | virtua...
gosddc/vagrant-vcenter
VMware Automated Lab: ESXi With Packer |
Go SDDC!
Time to replace RJ-45 connectors in the data center?
Automating Private Cloud Infrastructure with Puppet Enterprise and Razor | Datap...
Evernote Knowledge Base | Evernote
Interview with Emma Jane Hogbin Westby, Git | Opensource.com
How to set up your Raspberry Pi in Linux | TechRadar
From Iso To Vagrant Box
Sample Vagrantfile for vagrant-vsphere - Virtxpert
Everything You Need To Know About AC Routers
Oaktree Memo from our Chairman
The Chef, the Puppet, and the Sexy IT Admin | WIRED
Configuring USB Wifi TP-Link TLWN725N adapter on Kali Linux | l33t tutorials
TLWN725N
An introduction to testing, and its value to sysadmins. Part 1 · Paul Graydon
Using ZFS replication features in FreeBSD to improve my offsite backups | icefla...
Dune, 50 years on: how a science fiction novel changed the world | Books | The G...
Installing and Configuring X2Go Server and Client on Debian 8
Host specific SSH settings · Paul Graydon
Sysadmin Notebook: One line web server
while true; do { echo -e "HTTP/1.1 200 OK\r\n"; cat index.html; } | nc -l 8080; done
Howto setup High-Available HAProxy with Keepalived | Patrick"s Blog(2)
Octopress
Increasing performance in KVM virtualization within a Tier-1 environment
HowTo Improve IO Performance for KVM Guests - MDLog:/sysadmin
Free database backup software for MS SQL Server including Express | www.SQLServe...
Actifio - Copy Data Virtualization for the Enterprise and Cloud
Indian Rice Pudding Recipe : Aarti Sequeira : Food Network
Kheer (Rice Pudding) Recipe - Allrecipes.com
Simple keepalived failover setup on Ubuntu 14.04 - Raymii.org
F5 Alternative using HAProxy and keepalived | thejimmahknows
The culture-shift of moving to public cloud - SysAdmin1138 Expounds
Cloud Computing Price Comparison | Cloudorado - Find Best Cloud Server from Top ...
Two Factor Authentication for ownCloud
NAPS2 (Not Another PDF Scanner 2) download | SourceForge.net
Lessons in IT security: 5 rules small businesses need to follow by Matthew Stibb...
1024px-zip_code_zones.svg 2.png (1024×701)
Soldering Station | DebuggingLab
Psensor - A Graphical Hardware Temperature Monitoring Tool for Linux
LUA Buglight 2.3, with support for Windows 8.1 and Windows 10 - Aaron Margosis" ...
A High-performing Mid-range NAS Server - Pivotal Labs
xraj / windows-fromscratch — Bitbucket
Automating Website Creation with PowerShell v3 | Ponderings on Business, Finance...
How to - Create multiple IIS sites from text file using Powershell - API/SDK Dev...
Fig | Fast, isolated development environments using Docker
Custom error pages in ASP.NET MVC. Easy, right? - Ben Foster
Dogs, Rush hour traffic, and the history of storage I/O benchmarking–Part 1 | vm...
OpenProject - Overview - OpenProject
Managing IIS and ASP with Puppet | Andrew Krug: tech.web.net.reviews
9 Steps to Becoming a Better Public Speaker
6 Creative Uses for Wireless Surveillance Cameras in Your Home
Automating IIS with PowerShell | Windows Server Help
Backup with these DeDuplicating Encryption Tools - Linux Links - The Linux Porta...
Install MySecureShell SFTP Server In Linux
How to install and configure ZoneMinder – Linux CCTV – Debian 8 Jessie. » termin...
Cambozola
Deb Multimedia Packages::Home
apt-get install deb-multimedia-keyring
Efficient SQL Server in Azure VM Backup Strategies using DS-SERIES and Premium S...
VoIP done right: 11 best practices for moving to cloud-hosted PBX
10 Practical Examples Of Linux "nmap" Command | Unixmen
How to benchmark your GPU on Linux
glxgears
How to Crack a Wi-Fi Network"s WPA Password with Reaver
The Antenna Theory Website
9 DIY Landscaping and Gardening Skills That Will Save You Money
101 Things I Wish You Knew About SQL Server - Thomas LaRock
Fixing Errors with Windows Updates - The Blog of Todd
net stop wuauserv Rename the Software Distribution folder. Then start the Windows Update service. net start wuauserv
24 Quick Daily Habits You Can Use to Be Smarter
The Next Era of IT - Plexxi
Languages made easy with OneNote - Australian Teachers Blog - Site Home - MSDN B...
Online Reading for Kids: 5 Ideas to Motivate Struggling Readers
Remove an Offline Domain Controller
Securosis Blog | My 2015 Personal Security Guiding Principles and the New Rand R...
Turn Your Raspberry Pi into a Network Monitoring Tool
load balancing, affinity, persistence, sticky sessions: what you need to know | ...
active directory - NTLM through proxy server - Server Fault
Smart building: Building bridges between IT and facilities - O"Reilly Radar
ASP.NET Mixed Mode Authentication
NTLM Authentication Scheme for HTTP
Zero-Downtime Restarts with HAProxy - igvita.com
Screen Capture Made Easy with these Dedicated Tools - Linux Links - The Linux Po...
DSC Resource Kit flourishes as open source - Windows PowerShell Blog - Site Home...
NASA Images
5 cyber security tips for travellers
Replaying Linux CLI commands with history - Myles Gray
Safe Computing In An Unsafe World: Die Zeit Interview | Dan Kaminsky"s Blog
Scanning for network vulnerabilities using nmap - Myles Gray
The H-1B visa program is a scam
The problems facing chief information officers
Kitchen Soap – Some Principles of Human-Centered Computing
The Hex Colors in Small Basic - Small Basic - Site Home - MSDN Blogs
Leadership Skills for Making Things Happen - J.D. Meier"s Blog - Site Home - MSD...
Zero Copy I/O Aggregation (Bizarre ! Vous avez dit Bizarre ?)
Lantern: A New 925 MHz to 2175 MHz RTL2832U Based SDR for Satellite Reception | ...
204 Wireless Intrusion Detection System with Raspberry Pi Chris Jenks - YouTube
Refreshing A SQL Mirrored Database Using Powershell « SQL DBA with A Beard
Check MSSQL Database Mirroring - Nagios Exchange
Using Powershell to Set Up SQL Server Mirroring | Personal Weblog of a DBA
sql server - Tools to manage sql 2008 database mirroring? - Server Fault
PearBudget | a really simple budget
,
Cheap Domain Names-Domain Name Registration-Transfer-Renewal: NameSilo
openHAB - empowering the smart home
HomeGenie, Home Automaton Server in the Internet Of Things era
How To Configure A High Available Load-balancer With HAProxy And Keepalived | Un...
Keepalived & HAProxy in AWS: An Exploratory Guide
The Scale-Out Blog: Virtual IP Addresses and Their Discontents for Database Avai...
Open Source Industrial Smart Camera • Hackaday.io
Rethinking security: Securing activities instead of computers
puppet-community/puppet-windowsfeature
puppet-community/puppet-iis
Keycloak - JBoss Community
Kubernetes by Google
Stop Disabling SELinux
Control X10 with Mochad and PHP on a Raspberry Pi | Will"s Blog
Deploy and Manage Your Docker Containers. — Project Atomic
Home Automation with X10, Raspberry Pi, Linux and Ruby on Rails | harmdelaat.com
Installing mochad on a Raspberry Pi | X10 Linux
Using ltree for hierarchical structures in PostgreSQL
Ltree module for PostgreSQL
Git Workflow and Puppet Environments | Puppet Labs
Tackling Windows with Puppet!! | OlinData
Managing Windows with Puppet | Puppet Labs
A Git Horror Story: Repository Integrity With Signed Commits
git - the simple guide - no deep shit!
What Phones Looked Like Before And After The iPhone Transformed The Industry [Im...
Vintage Spirits and Forgotten Cocktails | Drinks From the Past for the Future
wview - Linux/FreeBSD/Unix/Mac OSX Weather Station Software
Home » OpenStack Open Source Cloud Computing Software
Discourse
- The Doubleclicks
linux - How to blacklist a correct bad RAM sector according to MemTest86 error i...
8 tools for visualizing data with open source | Opensource.com
Pragmatism in the History of GNU, Linux and Free/Open Source Software | Open Sou...
CIOs must lead their organizations in digital | The Enterprisers Project
entire
Four things businesses need to know about payment card compliance
How businesses should tackle information security
Why I won’t run another startup — Medium
Database Mirroring Monitoring and Alerting | SQL TWIST - This Week in SQL Server...
The 11 deadly sins of product development - O"Reilly Radar
Deploy plugins / workflows assemblies with Powershell - Aymeric @ Microsoft - Si...
TeeJee Tech: TimeShift
Buildroot project reports progress, releases update ·  LinuxGizmos.com
Buildroot: making embedded Linux easy
Connecting Strategy to Tactics - Josh Can Help
Jailhouse | Linux Journal
Troubleshooting SQL Server: A Guide for Accidental DBAs
Airtime  |  Sourcefabric
Understanding Storage Architectures. - Virtual Geek
Remus - Xen
failure
CNC Router Plans: Download free CNC router plans
InfoSec Handlers Diary Blog - Checking for BACNet devices inside corporate netwo...
On Managing Developers | TechCrunch
Working with SharePoint Workflow inside Outlook add-in – Part 2 - Experiments Wi...
The application "ASP.NET 5 (vNext) Real-Time Data Editing" was updated for using...
Why “Agile” and especially Scrum are terrible | Michael O. Church
Working with SharePoint Workflow inside Outlook add-in – Part 1 - Experiments Wi...
Creating Dev and Test Environments with Windows PowerShell - Kirk Evans Blog - S...
There is no /8TB flag on 64-bit Windows - The Old New Thing - Site Home - MSDN B...
Cloud Security as a Shared Responsibility - Microsoft Azure Security - Site Home...
fsck of vCenter Server Appliance 6.0 partitions | CormacHogan.com
Crockpot Creamy Cheesy Chicken Spaghetti | Crockpot Gourmet
The Food Lab: The Road To Better Risotto | Serious Eats
10 Cheap and Easy Summer Meals | Cheapism.com
Charlie"s Diary
alessandro.carminati: Access your PBX using voice channels
reasons can be many. The most obvious is that this software is already there, it is quite old and tested. But if you need another, I can add that old modems produce a
users.ece.cmu.edu/~omutlu/pub/flash-memory-failures-in-the-field-at-facebook_sig...
static.googleusercontent.com/media/research.google.com/en/us/archive/disk_failur...
www.cs.cmu.edu/~bianca/fast07.pdf
German government cloud: "Open source where possible" | Joinup
Cost of Living
Building your own SDR-based Passive Radar on a Shoestring | Hackaday
Expat on the Cheap: A Quick Guide to Affordable International Living
Open Source History: What if GNU and Linux Had Cloned MS-DOS, Not Unix? | Open S...
ting sti
Gluten Free Macaroni And Cheese Recipe - Food.com
Michael DeHaan • The Case for Test Driven Development
How To Map User Location with GeoIP and ELK (Elasticsearch, Logstash, and Kibana...
Adding Logstash Filters To Improve Centralized Logging | DigitalOcean
How To Use Kibana Dashboards and Visualizations | DigitalOcean
How To Install Elasticsearch, Logstash, and Kibana 4 on Ubuntu 14.04 | DigitalOc...
Why do events logged by the ReportEvent function show up in the wrong order in t...
How to develop your child"s full potential
Another look at the impact of the coming 2015 leap second (not much) - Satisfy M...
Red Hat CEO: Public cloud "obscenely expensive at scale" - TechRepublic
Raspberry Pi Rack • Hackaday.io
connected to the GPIO pins the Pi to provide power, with the other ends glued to the sled. Power and ethernet are really the only connections I care about in this project, as the Pis will be ran headless. The Pi can be powered by these GPIO pins using any 5v source, but it bypasses protections on the usb micro p
Dairy-Free Vegetable Quiche (With Eggs) | Gimme Some Oven
How to Rename SharePoint 2013 Site Collections Without Prayer or Sobbing - Todd ...
13 Things IT People Wish You Knew About Computers
Creating a Wildcard DNS Record for Fun and Profit - Todd Klindt"s SharePoint Adm...
W3wp High CPU Usage Scenario - Support Engineer Days Online - Site Home - MSDN B...
Blessay: Linux on Network Switches Makes Sense. For Your Career - EtherealMind
Troubleshooting Null Reference Exceptions in live ASP.NET applications - TechRef...
How the modern IT team should look
Finding Printer IPs Easier in Print Management - DeployHappiness
Best Practices for Group Policy Printer Preferences - DeployHappiness
Apps by Sven Faw
graydon2 | Rust release lightning talk
Eltechs ExaGear Desktop
Rename SSAS databases with Powershell - namburis - Site Home - MSDN Blogs
Copying data from one SQL server table to another SQL Server table - Sonam Rasto...
SharePoint Clustering Techniques for High Availability SharePoint - Build on Sha...
Foreman
mist.io :: cloud management in your pocket ::
Management Tools - KVM
Have I been pwned? Check if your email has been compromised in a data breach
The RetroPie Project | petRockBlog
Pi MusicBox - A Spotify, SoundCloud, Google Music player for the Raspberry Pi, w...
FrontPage - Raspbian
Forensic investigations: Retrieving data from the cloud
Install Freeradius on ubuntu 15.04 Server and manage using daloradius (Freeradiu...
When it comes to risk-taking, CIOs must have their team’s back | The Enterpriser...
SQL Server 2014 Service Pack 1 Unattended Setup Error - "The specified value "Up...
SSH ProxyCommand example: Going through one host to reach another server
Working the EDRM Backwards
How Job Interviews Have Changed Over the Years
The 25 KPIs Every Manager Needs To Know | Bernard Marr | LinkedIn
OpenStack Making Progress, but Manageability Remains a Concern
5 Great Reasons to Upgrade to Kibana 4 - Logz.io
WaveDrom - Digital timing diagram everywhere
How to do simple screencasting on Linux
Linux secrets most users don"t know about | ITworld
Top 10 Key Considerations for Deploying SAP Applications on Azure - Running SAP ...
Case of Transaction Log backups not getting restored - TechReflections - Site Ho...
Key Considerations for WSUS 6.2 on Windows Server 2012 R2
Mouse freezes on VDI machines: A surprising solution - Part 2 | sepago
Installing Reporting Services extensions on SQL Server 2014 - Microsoft Dynamics...
Deploying OEM machines with MDT | MSitPros Blog
A forgotten/hidden GEM | MSitPros Blog
SQL Server Backup Audit - SQLRockstar - Thomas LaRock
17 Tools Every Startup Needs - Business Opportunities
Reset User Passwords with AD Self Service Portal - DeployHappiness
Windows 8 has new policy to prevent users from being connected to your corporate...
Griffon"s IT Library » PROXMOX VE » Install PROXMOX VE From a USB STICK
Manufacturers and Utilities Are Leading the IoT Charge with 600M "Things" - Data...
Walmart Delivers Every Day Low Prices with OpenStack Cloud Power - Datamation
Get into Docker – A Guide for Total Newbies | Voxxed
How to Install Seafile on Ubuntu 15.04 (Vivid Vervet)
Interview with Rob Hirschfeld of RackN | Opensource.com
Rob Hirschfeld
Using Hiera with Puppet | Linux Journal
Encrypting and decrypting files with password in Linux - blackMORE Ops
IE11 and the Mysterious Missing Browser Modes
Virtual Machine (VM), Windows Virtual PC & Browserstack : MSEdge Dev
Lessons from managing an open source CMS project | Opensource.com
Seth"s Blog: A new way to move forward
altMBA
Introductory Gear Equations | Application Bulletin
Emulating browsers and weird CSS problem | SharePoint Dragons
Adding Help to your PowerShell Script | Keith"s Consulting Blog
Time For a Change (of Environmental Variables) — Steven Murawski
How to find which user deleted the user database in SQL Server - Microsoft SQL S...
Oh, not again! SQL Server Service is not starting… - TechReflections - Site Home...
Unix and Linux startup scripts Part 4, Systemd
Unix and Linux startup scripts, Part 3
Mouse freezes on VDI machines: A surprising solution | sepago
An Excel Template for Every Occasion
13 Hacks to Avoid Burnout at Work
33 DIY Dog Toys from Things Around the House | BarkPost
10 DIY Dog Toys You Can Make for Pennies
Writing Windows PowerShell DSC Resources and Configurations | Microsoft Ignite 2...
MenuetOS
Some practical notes on WSUS – Early 2015 | Keith"s Consulting Blog
lzybkr/PSReadLine
How to obtain versions of Internet Information Server (IIS)
Learn Statistics for Free with These 6 Resources
Symantec - Communication ports used by Symantec Endpoint Protection
Send Mail To Team using Custom Workflow Activities in CRM 2013/2015 - Shraddha D...
CISCO VPN Client dropping with “Reason 422: Lost contact with the security gatew...
The maths most SAN engineers do not understand in context of Database Servers
VMware KB: Tips for configuring Microsoft SQL Server in a virtual machine
e
Migrating SQL Reporting Services to a new server by moving the Reporting Service...
akjoshi"s Blog - Using RS Scripter to create deployment script for reporting ser...
SQL Server Performance Tuning : Table Variable Vs Temporary Tables - naga - Site...
Query of the day: finding SQL Server queries with large memory grants - Esoteric...
Three Techniques for Changing Vibration Alerting Signal
13 International Crock-Pot Recipes That Are Out of This World
GitLab: Web-based Git repository manager | panticz.de
Driverless Mouse and Keyboard Sharing • Hackaday.io
Weekend Scripter: Use PowerShell to Automate Active Directory Accounts - Hey, Sc...
Wappalyzer
Netflix/Fido
Transparency Toolkit | Watching the watchers
OMI
Windows PowerShell Desired State Configuration Overview
PowerShell DSC for Linux is now available! - Windows PowerShell Blog - Site Home...
www.msi.com/pic/faq/10015790@2015-0206-0239-237248@faq_0000000001178_en.pdf
Cmap | CmapTools
Pixiewps, Reaver & Aircrack-ng Wireless Penetration Testing Tool Updates | Kali ...
Berkshire Hathaway Official Reading List 2015: Approved Books by Buffett and Mun...
SQL Server and ‘Instant File Initialization’ Under the Hood – Part 1 - Esoteric ...
The Best Questions to Ask a Job Seeker During an Interview - Business Opportunit...
The Seven Sins against TSQL Performance
Deploying a DNS Server using Docker - SAMEER NAIK
5 videos to help you learn about Docker | Opensource.com
LXC: create Debian Wheezy container | panticz.de
aim4r/VolDiff
How to build nginx with Google PageSpeed module on Debian 8 (Jessie)
How to install a Debian 8 (Jessie) Minimal Server
How to Securely Store Passwords and Api Keys Using Vault
American Airlines flights delayed because of iPad app glitch
Terminating Suspended SharePoint 2013 Workflows | SharePoint Voodoo
Forward My Good SysAdmin, Forward I Say! — Steven Murawski
PowerShell Script to Limit SharePoint Site Templates Available
SNMP Server(snmpd) and Client(snmp) Installation and Configuration in Debian
How I shrunk a Docker image by 98.8% – featuring fanotify | Yet another enthusia...
Fix for ubuntu 15.04 screen resolution issue on Virtualbox | Ubuntu Geek
sudo apt-get install virtualbox-guest-dkms
Google Provides Detailed Analysis of GitHub Attack Traffic | Threatpost | The fi...
Windows 8 Password Recovery On Systems With Secure Boot - Kirk Miller
Screencast - Pontão Nós Digitais
SQL Server Performance Tuning: Creating a Shell Database to tune your Production...
Transforming data in a data warehouse through SQL views - Andreas De Ruiter"s BI...
Batch Script to Backup All Your SQL Server Databases
August 2012 - Timothy Khouri"s Blog
Disk Partition Alignment Best Practices for SQL Server
fsutil fsinfo ntfsinfo c:
Visual Studio 2010 – Unattended Silent Install | The Code Log
SQL Server 2008 R2 – Unattended Silent Install | The Code Log
Snap4Arduino beta
Getting Started with ArduBlock | Ardublock
Learn How to Solder, with These Simple Tips and Projects
ffDiaporama | Movie creator from photos and video clips
Getting started with RANCID
Demo: Monitoring Traffic on Cumulus Switches with sFlow – Cumulus Networks® Cust...
Chris Harrison | Zensors
The top 5 reasons why IT projects fail
e
My Two months with Moto 360 [review]
Managing Web Site Compatibility in Enterprise Mode for IE11 | Windows 8.1 conten...
Clearing the Windows Update Cache - The Blog of Todd
Understanding MS DTC Resources in Windows Server 2008 Failover Clusters
Install MSDTC onto 2008 R2 Failover Cluster
annotated
MSDTC Troubleshooting « GAPTHEGURU
begin distributed tran select * from [remoteservername].master.sys.sysprocesses commit tran
Interview with James Schweitzer, IBM | Opensource.com
James Schweitzer
Distributed Transaction Coordinator | Services Guide | Smallvoid.com
msdtc -resetlog
MS Distributed Transaction Coordinator (MSDTC) | SQL Server Performance Forums
Monitor MSDTC Distributed Transaction Coordinator Performance
strComputer = "." Set objWMIService = GetObject("winmgmts:" _ & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2") set objRefresher = CreateObject("WbemScripting.SWbemRefresher") Set colItems = objRefresher.AddEnum(objWMIService," & _ "Win32_PerfFormattedData_MSDTC_DistributedTransactionCoordinator"). _ objectSet objRefresher.Refresh For i = 1 to 5 For Each objItem in colItems Wscript.Echo "Aborted Transactions: " & objItem.AbortedTransactions Wscript.Echo "Aborted Transactions Per Second: " & _ objItem.AbortedTransactionsPersec Wscript.Echo "Active Transactions: " & objItem.ActiveTransactions Wscript.Echo "Active Transactions Maximum: " & _ objItem.ActiveTransactionsMaximum Wscript.Echo "Caption: " & objItem.Caption Wscript.Echo "Committed Transactions: " & objItem.CommittedTransactions Wscript.Echo "Committed Transactions Per Second: " & _ objItem.CommittedTransactionsPersec Wscript.Echo "Description: " & objItem.Description Wscript.Echo "Force Aborted Transactions: " & _ objItem.ForceAbortedTransactions Wscript.Echo "Force Committed Transactions: " & _ objItem.ForceCommittedTransactions Wscript.Echo "In-Doubt Transactions: " & objItem.InDoubtTransactions Wscript.Echo "Name: " & objItem.Name Wscript.Echo "Response Time Average: " & objItem.ResponseTimeAverage Wscript.Echo "Response Time Maximum: " & objItem.ResponseTimeMaximum Wscript.Echo "Response Time Minimum: " & objItem.ResponseTimeMinimum Wscript.Echo "Transactions Per Second: " & objItem.TransactionsPersec Wscript.Sleep 2000 objRefresher.Refresh Next Next
dotnetbase.co.uk | Enabling and Reading MSDTC trace files
Distributed Transaction Coordinators, Port 135, and Firewalls – Oh My! | Fairway...
www.chicagotech.net/netforums/viewtopic.php?f=1&t=14300
truncated
Troubleshooting Problems with MSDTC
database
Note to Self: Don’t forget to add to indexed properties | SharePoint Dragons
The Puppet design philosophy - O"Reilly Radar
The log: The lifeblood of your data pipeline - O"Reilly Radar
InfoSec Handlers Diary Blog - Reminder: Secure Your Tomcat Admin Interface
PacketFence: PacketFence v5.0 released
Linuxphile.org
ClouDNS: Free DNS hosting and domain names
fossBytes - fresh bytes of technology and more
How to make Linux"s desktop look good on HiDPI displays
MS15-034 Detection: Some Observations | Didier Stevens
RaspArch :: Run Arch Linux on your Raspberry Pi 2 | RaspEX for Raspberry Pi 2
Disaster Recovery, WinTech and WinPE | Simon Says - Musings of a Technology CTO
SQL Server Monitor with Version Control - CodeProject
executing
Minion Reindex | Midnight SQL Consulting, LLC
Simple Talk: SQL Server and .Net articles, forums and blogs
Database Health Monitor | Software to Improve SQL Server Health
SQL Hammer
Part 4: Install pfSense on ESXi 5.5 - Calvin Bui
u
Part 1: Install pfSense on ESXi 5.5 - Calvin Bui
Part 3: Install pfSense on ESXi 5.5 - Calvin Bui
Part 2: Install pfSense on ESXi 5.5 - Calvin Bui
PfSense 2 on VMware ESXi 5 - PFSenseDocs
Pssdiag and Sqldiag Manager - Home
SQL Server Performance Tuning: Data Access Method - naga - Site Home - MSDN Blog...
The Most Popular Hyper-V PowerShell Cmdlets - by Bing - Ben Armstrong - Site Hom...
30 Days of Bootstrap with the MVC Framework - Revisited - Canadian Developer Con...
SP2013 Search Index health reports for monitoring and troubleshooting - SharePoi...
4 TED Talks to Help You See Your Money in a New Way
The Five Tibetans | Hugh Howey
The many "modes" of multimode - The Network Sherpa
Notion – Document Reimagined
Hackpad
How to Root Your Chromecast
IE Enterprise Mode in a Nutshell - NoTime - Site Home - MSDN Blogs
joeware – never stop exploring… :) » Blog Archive » They said it couldn’t be don...
devttys0/binwalk
Advanced Endpoint Security - Threat Detection - Red Canary
Ansible - sudoers safety and sanity checking in playbook - Raymii.org
OpenRemote - Home of the Digital Home
Projects
Optical Fiber and 10 Gigabit Ethernet
Doing Your Taxes? 5 Excel Formulas You Must Know
New to Craft Beer? Start with the Best Beer Websites & Communities
ScraperDecryptor utility to fight against Trojan-Ransom.Win32.Scraper (TorLocker...
Unlock a secret dark theme in Windows 10 with a registry hack
Klocman software - BCUninstaller
Microsoft SQL 2012 Licensing in a VMware environment VMGuru
Finding Your SAN Bottlenecks with SQLIO by Brent Ozar Unlimited®
community.wacom.com/en/inspiration/blog/2013/october/unique-use-for-wacom-tablet...
Don’t Be Fodder for China’s ‘Great Cannon’ — Krebs on Security
How To Write PowerShell Functions in a Week of Blog Posts - Todd Klindt"s ShareP...
Is any of your ESXi vmnics saturated?
Real World Computing: Cloud Services and the Business
Windows Physical to Virtual Bare Metal Restore - Unitrends
Are P2V conversions still worth doing? - TechRepublic
on’t create an obsolete operating system museum. While a P2V may solve a need, don’t set yourself up for running an obsolete operating system forever. Start the conversation, including the budget part, to get a system retired or migrated to the correct platform. The benefits
Dead Drops | Un-cloud your files in cement! "Dead Drops’ is an anonymous, offlin...
InfoSec Handlers Diary Blog - Guest Diary: Xavier Mertens - Analyzing an MS Word...
A 5 Second Boot Optimization If You’ve Disabled IPv6 on Windows Client and Serve...
DisabledComponents performance increase while disable IPv6
How To Desolder Components | Hardware Secrets
Importing / Deploying / Executing the SSIS packages fails on the newly migrated ...
Customize the background colour of Office 2010 tiles on the Start screen - dai -...
erwbgy/check_mk · Puppet Forge
My VSAN Journey - Part 1 - The homebrew "node" - ESX Virtualization
BlackArch Linux | Penetration Testing Distribution
Cannot format hard disk with VMFS5 after removing it from RAID array | vBrain.in...
partedUtil setptbl /vmfs/devices/disks/naa.5000c50023397a33 msdos
EMET Deployment
server - How do I remove the "Write the Changes to the Disks?" question during p...
debian 6 preseeding keeps asking "Write the changes to disks and configure LVM?"...
VM Snapshots with VSS – Traditional versus VVols | CormacHogan.com
VSAN 6.0 Part 7 – Blinking those blinking disk LEDs | CormacHogan.com
VSAN 6.0 Part 6 – Maintenance Mode Changes | CormacHogan.com
VSAN 6.0 Part 5 – new vsanSparse snapshots | CormacHogan.com
InfoSec Handlers Diary Blog - Wireshark TCP Flags
VSAN 6.0 Part 4 – All-Flash VSAN Capacity Tier Considerations | CormacHogan.com
More Virtual Volumes (VVols) and Snapshots goodness | CormacHogan.com
VSAN 6.0 Part 3 – New Default Datastore Policy | CormacHogan.com
VSAN 6.0 Part 2 – v2 On-disk Format Upgrade Considerations | CormacHogan.com
VSAN 6.0 Part 1 – New quorum mechanism | CormacHogan.com
MYTHBUSTING Outlook IS NOT better than Lotus Notes, pt 8: Reply without History
FraudRecord - Report and Query Unpleasant Clients, Frauds, Fraudsters, Scammers,...
That grumpy BSD guy: In The Name Of Sane Email: Setting Up OpenBSD"s spamd(8) Wi...
VSAN: the performance impact of extra nodes versus failure | @hansdeleenheer
(iBoyd) » Applying KB2506143 to an offline Windows 7 SP1 WIM = Windows Setup fai...
SEP 12.1 and Notes Multi-user install location | Symantec Connect
Hacker Tradecraft
Active Directory Powershell – Advanced Filter - Active Directory Powershell Blog...
Active Directory Powershell – Advanced Filter (Part – II) - Active Directory Pow...
VMware VSAN - Virtual SAN - How to configure - DavidHill.co
Rapid7 Community | Rapid7 Community
AD ACL Scanner - Home
Getting Our Computername in a PowerShell Script - Michael"s meanderings...
$computer = gc env:computername
Sanesecurity ClamAV blog: zero hour malware, phishing and scams
Dewhurst Security Blog -
Pitfalls When Managing Groups in Active Directory | Active Directory content fro...
Windows 8/8.1 system clock changing randomly while powered on and in use - Stack...
H.323 Video Conference Codec behind PFSense *Guide / Explanation*
Rescatux
Cryptowall 3.0: Back to the Basics
of attacks.
MagicInfo Pro Quick User Guide
DFS Replication in Windows Server 2012 R2: Revenge of the Sync - The Storage Tea...
IPv6 to Standard
Lego Computer | Total Geekdom
DFS Replication in Windows Server 2012 R2: If You Only Knew the Power of the Dar...
Monitoring | Bits and Bytes
Low End Box - Cheap VPS Hosting Providers Listing & Reviews
Managing Active Directory with PowerShell
Fast Troubleshooting for Windows Time Service (w32time) Synchronization
Windows XP Folders and Locations vs. Windows 7 and Vista - TechNet Articles - Un...
Batch File to Correctly Determine Operating System Version - Windows XP and DOS
ProjectWise DMSKRNL.cfg Database Encryption - Content Management - Blog - Conten...
Shodan
How to determine the OS type in a logon script
Public domain recordings
UC Corner: NTP - Network Time Protocol
windows - How can I query my system via command line to see if a KB patch is ins...
wmic qfe get hotfixid | find "KB99999" wmic qfe | find "KB99999" Get-WmiObject -query "select * from win32_quickfixengineering" | foreach {$_.hotfixid}
Deploying the vCenter Server appliance (Back to Basics)
SecurityNewsPortal.com features the latest cyber security news about security, h...
Dyre Wolf attack swipes $1 million in wire transfers
Terraform 0.4 - HashiCorp
Setting up HAProxy | Knowledge Center | Rackspace Hosting
HAproxy - Quick and Dirty HTTP Load balancing Tutorial on Redhat/Centos - Hostin...
Load Balancing with HAproxy
HAProxy Quickstart w/ full example config file
Load Balancing with HAProxy - Servers for Hackers
3 Tier Deployment Setup (HAProxy-IIS-SQL) - RightScale Technical Support
ELBs do not cater for your environment? Set up HAProxy for your IIS servers | Kl...
Mailcleaner – adding uceprotect.net RBLs | The Wacky World of Chris Knight
Multi-RBL Check | The Anti-Abuse Project
How to interview a prospective employer
Managed DNS considered harmful - O"Reilly Radar
Not So Dynamic Updates | Linux Journal
How to test if 9000 MTU/Jumbo Frames are working - Myles Gray
How to actually get the AS400 oledb connection with .net | Michael Ellerbeck
Thought for The Day: NetBIOS over IPX - EtherealMind
InfoSec Handlers Diary Blog - SSH Fingerprints Are Important
3 Tips for Deploying a RADIUS Server for Wi-Fi Security
New Site Recovers Files Locked by Cryptolocker Ransomware — Krebs on Security
Recovering Ransomlocked Files Using Built-In Windows Tools | Symantec Connect
We Have Your Files. If You Ever Want To See Them Again... Pay Now. — Cyber Secur...
FireEye - Fox IT Scanner
CryptoLocker Ransomware Information Guide and FAQ
Destructive malware “CryptoLocker” on the loose – here’s what to do | Naked Secu...
Cryptolocker Ransomware: What You Need To Know | Malwarebytes Unpacked
Cryptolocker 2.0 – new version, or copycat?
Manual Data Recovery With A Hex Editor | Hackaday
The 9 Types of Horrible Bosses – And How to Manage Them
18 Easy and Delicious Recipes for Your Dutch Oven
How to Generate/Encrypt/Decrypt Random Passwords in Linux
pwgen
Contributor spotlight on David Both | Opensource.com
Default Search Index File Location for SharePoint 2013
Digital Asset Management with digiKam | Scribbles and Snaps
Decompile a Video File Into Images with FFMPEG on Linux
$13 HAT aims Raspberry Pi at real-world I/O projects ·  LinuxGizmos.com
Converting VMware thin disks to thick using Inflate - Myles Gray
Apache -- 20 years of the world"s favorite web server
Why Windows 10 is the best platform for your modern business! - Microsoft UK Sma...
Updates in AD not reflecting in SharePoint - Voyage - Site Home - MSDN Blogs
blogs.msdn.com
Integrating the Shipping Carrier Interface in AX 2012 with UPS WorldShip - Part ...
Integrating the Shipping Carrier Interface in AX 2012 with UPS WorldShip - Part ...
[Sample Of Apr. 01] Create a three-tier ASP.NET web application with Entity Fram...
SQL Updates Newsletter - March 2015 - SQL Server Updates and Lessons Learned - S...
Some time away - I. M. Wright’s “Hard Code” - Site Home - MSDN Blogs
Removing a Missing Network Adapter - Ben Armstrong - Site Home - MSDN Blogs
Driver Signing changes in Windows 10 - Windows Hardware Certification blog - Sit...
Move to PowerShell for WinRM Management - Windows Management Infrastructure Blog...
Application Insights: Choose your own Performance Counters - Microsoft Applicati...
How to convert a short 8.3 path name to a long path name in PowerShell - Sergey ...
$long_path = (Get-Item -LiteralPath $path).FullName
https://otalliance.org/system/files/files/best-practices/documents/2014otadatabr...
10 Quick Things You Can do to Make Your Next Trip Better
5 Tools to Analyze Laptop Battery Life
Open Atrium
joeware – never stop exploring… :) » Blog Archive » AD Sites Without Domain Cont...
5 Lesser-Known Free Sites for Watching TV Shows
Get Started On DIY Electronic Projects with These Learning Sites
Google Gold: 15 Essential Chrome Extensions
PowerShell, Executing Internet Explorer as Network Service - MiguelNunez - Site ...
Q1 2015 Site Performance Report - Code as Craft
Home · SnabbCo/snabbswitch Wiki
Snabb
The IPython Notebook — IPython
Using VMWare and Automation Software (part 3 of 3) | Doug Brock
Virtualizing Automation Software for the Lowest Up-Front Cost (part 2 of 3) | Do...
Windows Compatability with Rockwell Software | Doug Brock
MDT 2013 Update 1 private – What’s new! | Keith"s Consulting Blog
CM Hyper 212 - Alternative G34 Mounting Method - [H]ard|Forum
SSD VPS Servers, Cloud Servers and Cloud Hosting by Vultr - Vultr.com
MIME | Premium Glass Protection
The Definitive Guide to Winning an Argument
Munger"s Advice on Shamans, Humility, and Attention Spans -- The Motley Fool
MultiBoot USB with Grub2 (boot directly from iso files) | panticz.de
Talk is cheap. Show me the code.: GRUB2 Multiboot USB Stick
Understanding DFSR conflict algorithms (and doing something about conflicts) - A...
Windows Server 2012, File Servers and SMB 3.0 – Simpler and Easier by Design - J...
Adblock Everywhere: The Raspberry Pi-Hole Way
adamkramer/dll_hijack_detect · GitHub
How the cloud can benefit smaller enterprises
Introducing videolooper 3.0 | Steves Computer Vision Blog
Developer dashboard on SharePoint 2013 | System Admins
organic fertilizer: DHCP Scope Information
Linux Performance Analysis: New Tools and Old Secrets
Home - LinuxUbuntu Apps Reviews | Tutorials | HowTos | News
Data Collection, Storage, Processing & Analysis Service | Treasure Data
GoAccess - Visual Web Log Analyzer
6 open hardware projects for Arduino Day | Opensource.com
InfoSec Handlers Diary Blog - Repurposing Logs
Securosis Blog | Network-based Threat Detection: Overcoming the Limitations of P...
New project: PiDP-8, a PDP-8/I Replica
more
clinta/cdpinfo · GitHub
Flexible Access Control with Squid Proxy | Linux Journal
Businesses embracing BYOD face a potential pornography problem
KeySweeper
joeware – never stop exploring… :) » Blog Archive » Security is like…
Integrate Any App | On-Premise & Cloud Integration Made Easy
The Hacker"s Diet
7 Quirky "ls" Command Tricks Every Linux User Should Know
Samsung Galaxy Tab Pro 12.2, 10.1, 8.4 - XDA Forums
The 5 Charitable Donations That Do the Most Good
TuxArena | Guide: Show System/Hardware Information in Linux
Here"s how a lithium-ion battery degrades over time
vSphere 6: Using VMCA as a Subordinate CA | Long White Virtual Clouds
PEP 20 - PEP 20 -- The Zen of Python | Python.org
Meteor
Steve Bunting"s Computer Forensics Resource Site
Upgrading to SQL 2014: Report Server version mismatch - SQL Server Team - Site H...
Group Policy Settings Explained - Windows Time Service - Site Home - MSDN Blogs
indicates how many potentially accurate time samples the client must receive in a series before subsequent time samples are evaluated as potential spikes. After a period of not receiving any usable time samples, a time client ceases to evaluate tim
ESXi 5.5 – ESXCLI Command Mindmap | Virten.net
Active Directory Health Check Script - The Sysadmins
20 Cheap and Easy Soup Recipes
joeware – never stop exploring… :) » Blog Archive » 30 Second Admin – Default Do...
for /f %i in (‘adfind -sc domainlist’) do @adfind -hh %i -sc dompol -dloid
How to filter BGP routes in Quagga BGP router - Xmodulo
Setting Up Folder Redirection - Part 1 - DFS Namespaces - DeployHappiness
Mini Excel Tutorial: Using Advanced Counting and Adding Functions in Excel
10 Great Arduino Projects for Beginners
Discovering PostgreSQL Strengths | Robin Bate Boerop | LinkedIn
Why I Choose PostgreSQL Over MySQL/MariaDB - Dice News
Deduplicating Amazon S3 Storage with StorReduce - Wahl Network
Common Information Model (CIM) Data for Home Lab Server Hardware - Wahl Network
Virtual Router - Wifi Hot Spot for Windows 8, Windows 7 and 2008 R2 - Home
SharePoint Learning Kit - Home
BizTalk Scheduled Task Adapter - Home
teachmeipv6.com/IPv6-Essentials-Cheat-Sheet-v1.3.pdf
Best way to set GPO for Windows 7 Power Management so computer never sleeps
Would Rust have prevented Heartbleed? Another look
Worship Maintainers - O"Reilly Radar
Tighten Up SSH | Linux Journal
Disable hibernation on Windows 7 and Windows 8 based systems - standalone and GP...
20 Office Potluck Dishes Everyone Loves
Analog OPSEC 101 – operational security in the physical world - Securelist
30 years of dotcom -- what became of the first 100 domains?
Automating Network Security (Troopers 2015) << SDN Architectures and Deployment ...
10 Indulgent Desserts That Are Actually Good for You
Security in Three Ds: Detect, Decide and Deny | Linux Journal
{never} homemaker: Peanut Butter Hearts
GNU Terry Pratchett
PowerCLI and PowerShell Workflows - LucD notes
SharePoint Caching (Configuration and monitoring) | System Admins
Grabbing Eventlogs from busy servers - servergeeks - Site Home - MSDN Blogs
Coffee Break - Windows PowerShell Remoting - Microsoft Dynamics NAV Team Blog - ...
Andy"s House O" Blog: The horrors of migrating to Domino when Single Item Recove...
pfSense without Internets - Room362.com
How to connect to a Wireless WIFI Network from the Command line in Windows 7 - S...
Mini Excel Tutorial: Use Boolean Logic to Process Complex Data
Flowcharts - User Ed - The blog of Ed Price, Customer Program Manager - Site Hom...
Root cause analysis of my VSAN outage : vmware
StackVDI: Opensource Virtual Desktop Infrastructure
Spice - Home page
Ulteo - Application and Desktop delivery made easy! Open Virtual Desktop - Ulteo...
FOSS-Cloud - FOSS-Cloud
GraphPaper
Etherpad
SqlPad - A web app for running SQL queries and visualizing the results
Barracuda Labs Threatglass
Split screen video in Kdenlive | Opensource.com
Setup Your Own "Speedtest Mini Server" to Test Internet Bandwidth Speed
OpenNebula | OpenNebula for Virtual Desktops
Premeditated Leftovers - Naturally Frugal Living
DIY Sitting / Standing Desk
Graceful SharePoint AppFabric Restarts - Build on SharePoint - Site Home - MSDN ...
The keys to a successful BYOD policy
Cards Against Originality, an app for Cards Against Humanity.
Arduino v Arduino: Part II | Hackaday
Arduino v. Arduino | Hackaday
Creative DRAM abuse with Rowhammer | Hackaday
H.323 Proxies and Firewalls
openh323proxy.sourceforge.net
Rowhammer takes a big swing at DRAM memory security
Qcow2 - KVM
How to Clean Everything With Just 3 All-Natural Cleaners
Errata Security: Some notes on DRAM (#rowhammer)
Running Your Own Open Source Email Server - Tuts Code Tutorial
ZFS on Linux
How to Use the OneNote for iPad Drawing Tools – by Jonathan Wylie - Microsoft UK...
Checking the progress of ‘dd’ « the blog of Chris
Mounting QCOW2 images
How Does Encryption Work, and Is It Really Safe?
Wearables are perfect for the enterprise
Ask Hackaday: The Many Uses of Microwaves | Hackaday
FREE, Award-Winning Tools For finding Hidden Data On A PC
Do Employers Want Too Much From Candidates? - Dice News
The Curse of the Former Employee It’s hard to replace someone who’s been on the job for years, keeping pace with changes in technology and the evolving needs of the employer. “Many companies lose sight of the fact that their employees, especially those with some tenure, have evolved a great deal since their hire date,” Simm said. “They’ve gained knowledge of technologies that are specific to said employer and their environment.” Employers also want to leverage as much of their employees’ skill sets as possible, in order to get the most out of them—which can make it difficult to hire just the right person. “Outside candidates tend to be disciplined in one area, and employers are looking for them to not only be great at what they need but also have strong aptitudes to match their wants,” Schultz said. “Sometimes what they want doesn’t go hand-in-hand with what they need.”
Reducing OCR software processing cost with higer accuracy results
OneNote: Copy Text from an Image | a Tech-Recipes Tutorial
OCR anything with OneNote 2007 and 2010
least
The DTC service cannot start - Distributed Services Support Team - Site Home - M...
HKLM\SOFTWARE\Microsoft\MSDTC\SysprepInProgress. If the value is 1, change it to 0 and try starting DTC again, which may solve your problem. It is by design that DTC cannot run during sysprep. The default value of SysprepInProgress is 0, indicating the system is not in the middle of sysprep.
A brief history of Microsoft CRM | Mark Margolis"s Blog
10 Resume Mistakes That Will Hurt Your Job Search
Incremental Backup - btrfs Wiki
Do-It-Yourself Backup System Using Rsync and BTRFS
Security Tips for Apache Web Server - Debian-based Systems
10 Leadership Ideas to Improve Your Influence and Impact - J.D. Meier"s Blog - S...
What the FREAK? Huge SSL security flaw stems from US government backdoor
Hearty One-Pot Meal Miso Soup | recipe from FatFree Vegan Kitchen
15 Easy and Delicious Cast Iron Skillet Recipes
https://dl.dropboxusercontent.com/u/17340943/Toolkit-55.ps1
How to setup a LAMP development environment in Vagrant
Automated Malware Analysis - Cuckoo Sandbox
best practice for migrate file server from EMC NAS to a new File server cluster
Apache JMeter - Apache JMeter™
My experiences with DFS replication on Windows 2008 R2
Techunboxed: How to Set Up DFS Replication in Windows Server 2012 R2
Windows Storage Server 2012 R2 — Improved DFS Replication - Windows Storage Serv...
Step by Step Installation and Configuration of OpenLDAP as Proxy to Active Direc...
Migrating DFS Namespaces to Preserve Old Domain Names - Ask the Directory Servic...
Embrio
Possible to add a linux SMB share as part of a DFS tree (or whatever they are ca...
SharePoint PeoplePicker Filtering Active Directory accounts by using LDAP querie...
Report SharePoint Content Source Last Crawl Duration - Joe Rodgers - Site Home -...
OpenCV | OpenCV
jwcrawley/uWho · GitHub
Step by Step : Deploy DFS in Windows Server 2012 R2 | Just a random "Microsoft S...
cryptsetup - Setup virtual encryption devices under dm-crypt Linux - Google Proj...
OpenSCAP/container-compliance · GitHub
pfSense - Squid Squidguard / Traffic Shapping Tutorial
Year Zero: Our life timelines begin - O"Reilly Radar
Are Conference Talks Getting Too Soft? | GeekyBoy.com
5 Amazing Linux IRC Clients to Keep You Chatting
How You Can Use Geofencing to Improve Your Privacy & Security
PowerShell Lessons Learned from Building an Automated SQL Installation and Patch...
Excel Quick Tips: How To Flip Cells & Switch Rows or Columns
This Web Business IV: Business Entity Options · An A List Apart Article
Open Source LMS – 10 Alternatives to Moodle | Barry Sampson
Bridges: a kludge that shouldn"t exist « ipSpace.net by @ioshints
Before Talking about vMotion across Continents, Read This « ipSpace.net by @iosh...
This is what makes networking so complex « ipSpace.net by @ioshints
Love the image
FireEye, Inc. | Out of Pocket: A Comprehensive Mobile Threat Assessment of 7 Mil...
Starting with Vagrant on Ubuntu 14.10 - A Beginner"s Guide
RHCSA Series: Reviewing Essential Commands & System Documentation - Part 1
RHCSA
Announcing Docker Compose | Docker Blog
Announcing RancherOS: A minimalist distro designed explicitly to run Docker | Ra...
Rethinking CSS Grids | Journal | The Personal Disquiet of Mark Boulton
3 new trends pressuring CIOs | The Enterprisers Project
IT Revolution Manifesto IT Revolution
(61%) Piecon / Pie charts in your favicon!
AMiner - Open Science Platform
Mark Burgess Website
Laser Cut Settlers of Catan Board
Karōjisatsu « IT Revolution IT Revolution
Karōjisatsu
Slack: Be less busy
appear.in – one click video conversations
When Strong Encryption Isn"t Enough to Protect Our Privacy
Visual tools for network traffic analysis
vDos | SourceForge.net
PowerShell: Search for appointments - EMEA Developer Support for Messaging Team ...
PowerShell Script to Simulate Outlook Web Access URL User Logon - gokarthi - Sit...
PowerShell Script Analyzer: Static Code analysis for Windows PowerShell scripts ...
5 Lessons Education Research Taught Us In 2014 : NPR Ed : NPR
Android for Work
Why we run an open source program - Walmart Labs // TODO: Talk openly, develop o...
Great Computer Programming Quotes - Software Development Quotations and Programm...
Today In Science History
Understanding .NET 2015 - Beth Massi - Sharing the goodness - Site Home - MSDN B...
From the SocialBizUG Mailbox: Managed Replicas and Mail Delivery Time - Articles...
ReplicateOnNewMail=1 (Replicate new mail from the server every time we detect new mail has been delivered. This is crucial in keeping the cache "up to date")
What Interviewers REALLY Think During Job Interviews
Learning How to Learn
www.barbaraoakley.com/pdf/10rulesofstudying.pdf
ForUs provides the next-generation 401(k) for small companies.
BGP Configuration Made Simple with Cumulus Linux « ipSpace.net by @ioshints
Changing Default Database File Locations in SQL Server - SQLRockstar - Thomas La...
Top Linux distros for computer repair | Opensource.com
Turn a Raspberry Pi Into an Ad Blocker with a Single Command
[object Object]
Fabric: a System Administrator"s Best Friend | Linux Journal
7 Python Regular Expressions Examples – Re Match Search FindAll
What are some obscure but useful Vim commands - Xmodulo
Jorgen’s Weblog: Why systemd?
Symple — Planet Friendly Ubuntu Linux PCs
Localhost DNS Cache | Linux Journal
Scripted window actions on Ubuntu with Devilspie 2
Fix for CBT bug in VMWare Products - Myles Gray
Securing enterprise mobile systems [Q&A]
[object Object]
linux - Running Intel 7260 in AP mode under Ubuntu 14.04 [solved] - Stack Overfl...
iTALC
Teampass · A Collaborative Passwords Manager
nilsteampassnet/TeamPass · GitHub
Ghiro - automated digital image forensics tool
recalbox.com
Decrypting TLS Browser Traffic With Wireshark – The Easy Way! | Jim Shaver
NethServer
How to Setup Failover and Load Balancing in PFSense
How to migrate to Drupal with ease | Opensource.com
Raspberry Pi Doorbell is Fully Featured | Hackaday
SharePoint 2010 CUs and Windows Update - Microsoft Office SharePoint and related...
InfoSec Handlers Diary Blog - Leave Things Better Than When You Found Them
These At-Home Exercises Will Give You a Gym-Quality Workout for Free
Using Try and Catch with PowerShell"s Invoke-WebRequest - Wahl Network
Open Source Log Management with Graylog
RFC 7454 - BGP Operations and Security
Jerry Lawson, a self-taught engineer, gave us video game cartridges
TeamBins Project Management & Issue Tracking Tool | TeamBins
Todour | nerdur.com
Kanboard - Simple and open source visual task board
TaskBoard
Equation Group: from Houston with love - Securelist
Fighting cyber threats hampered by disconnect between IT and business
A PowerShell Weather Service
Datalossdb.org : See Who Has Been Breached | . . TheSecurityBlogger . . .
It"s not just Samsung TVs — lots of other gadgets are spying on you -- Fusion
How a MongoDB Database Can Better Organize Your Data
Upgrade Your Skills with the Best Microsoft Office Courses Online
App::Netdisco - An open source web-based network management tool. - metacpan.org
elitwin/pgtune · GitHub
Keeping the bad guys out with fail2ban | ITworld
My personal blog: Elizabeth"s sweet potato with red curry coconut
Delegating Active Directory password reset rights -take 2 | Chris Conklin"s Webl...
ServiceBus 1.1: "The database (SbManagementDB) located at SQL Server (10.xx.xx.2...
Battle RA Royale: More VDI For Less Moolah | Long White Virtual Clouds
Do you ChangeLog? | vNinja.net
Markdown All the Things! | vNinja.net
Atom
String2String - HackCooper 2015 | Hacker League
How to Use npm as a Build Tool
npm
Inventorying SQL Servers with the Microsoft Assessment and Planning Toolkit (MAP...
Beyond Stuxnet and Flame: Equation "most advanced" cybercriminal gang recorded |...
User Idle Starter | Launch applications based on events | Adminscope.com
4 Tips & Tricks Every Android User Needs to Know
Your HDDs were RIDDLED with NSA SPYWARE for YEARS • The Register
Nobody cares how your IT project works, lead with the business benefits | The En...
My podcast: Episode 2 – The Red Queen theory of cyber security - Terry Zink: Sec...
GForge: automssqlbackup: Project Info
AD Bulkcreator | Creating objects fast | Adminscope.com
TOPspin Security DECOYnet Resources and Downloads
The Great Bank Robbery: the Carbanak APT - Securelist
Equation: The Death Star of Malware Galaxy - Securelist
A Fanny Equation: "I am your father, Stuxnet" - Securelist
Worldwide Equation Group hid undetectable spyware on hard drives
Windows Shortcuts 101 - The Ultimate Keyboard Shortcut Guide
Allen White : Scripting Index Maintenance with PowerShell
Allen White : Use PowerShell to Add a Login to a Database Role in all Databases
Allen White : System Inventory and Performance Gathering SQL Connections Session
Allen White : Script and Migrate Agent Jobs between Servers using PowerShell
Voluntary DBA - Proactive database administration
Practical PowerShell for SQL Server Developers and DBAs – Part 1
Backup and Restore SQL Server with the SQL Server 2012 PowerShell cmdlets
Allen White : Scanning the Error Log with PowerShell
Automated deployment for .NET - Octopus Deploy
www.red-gate.com/assets/products/sql-development/sql-source-control/entrypage/as...
pachyderm/chess · GitHub
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last | A...
3 new rules to keep your enterprise secure | The Enterprisers Project
The Ultimate Garage Door Seal and Threshold Seal
Privoxy - Home Page
Wapiti : a Free and Open-Source web-application vulnerability scanner in Python ...
Home - OPNsense
The top 10 rural regions of Japan that Tokyo residents would like to move to ‹ J...
THE CYBER DEFENSE REVIEW | A Joint Production of the Army Cyber Institute and Ma...
IQEmu - mirage335 wiki
Windows PowerShell and Dynamics NAV for your coffee break - Deploy Dynamics NAV ...
Running Multiple SharePoint SSL Websites on Separate SSL Certificates Using Serv...
Multi-subnet SQL Server Clusters SharePoint 2013 SPDatabase.MultiSubnetFailover ...
Friday the 13th Fun
Tonido: A Free, Private Cloud And Streaming Media Server | Unixmen
Microsoft Windows - Docker Documentation
PowerShell Prank #2: Enable Hardcore Mode - DeployHappiness
GroupWyse Software Products: PingView Network Monitor
Rclone - Sync File and Directories to Cloud Storage in Linux
InfoSec Handlers Diary Blog - Did You Remove That Debug Code? Netatmo Weather St...
How to Install and Use Linux Malware Detect (LMD) with ClamAV as Antivirus Engin...
e em
Build your own combined OpenVPN/WiKID server for a VPN with built-in two-factor ...
Crack passwords | Linux Voice
Trash is for Tossers
IPv4 Addresses and CIDR Fun - Lessons Learned - Site Home - MSDN Blogs
Wireless Power Outlets RF from Raspberry Pi | Tim Leland
Why You Should Care About Software Defined Radio | Hackaday
gentilkiwi/mimikatz · GitHub
MRAN - Managed R Archive Network · Data Sources on the Web
Hard Drive Test Data - Determining Failure Rates and More
Anthem: Yet Another Victim of the “Highly Sophisticated Attack” | . . TheSecurit...
Securosis/DataCenterEncryption · GitHub
Using `esentutl.exe /vss` to examine an in-use database - martinc - Site Home - ...
esentutl.exe /vss
A More Flexible Active Directory One-Liner | PowerShell content from Windows IT ...
Managing AD in Bulk Using PowerShell | Active Directory content from Windows IT ...
Creating Bulk AD User Accounts using PowerShell | Microsoft Enterprise Technolog...
Mass Changes in Active Directory · Scott"s Weblog · The weblog of an IT pro spec...
r
Use PowerShell to Modify Existing User Accounts in Active Directory - Hey, Scrip...
Updating AD users in bulk | Richard Siddaway"s Blog
o
Utilizing Add-ADUser & Import-CSV Powershell Cmdlets to bulk create Active Direc...
Java JNDI/LDAP: Windows Active Directory Authentication, Organizational Unit, Gr...
User Attributes - Inside Active Directory
ActiveDir.org
Evolution of SharePoint - Office Blogs
Useful Static .NET Methods - Power Tips - PowerShell.com – PowerShell Scripts, T...
Burp Suite Professional - release notes
How to Setup High-Availability Load Balancer with "HAProxy" to Control Web Serve...
How to find Active Directory users NOT set to PasswordNeverExpires with PowerShe...
Three ways to keep IT from becoming the "Department of No" | The Enterprisers Pr...
How to automatically bypass Windows 10"s login screen
Buy Cool, Stylish Laptop Backpacks and Utility Messenger Bag Online
An Illuminating Guide to Low Light Photography
u
Linux FT232R Projects and Stuff
The 100 Best Beers in the World - MensJournal.com
How To Scan And Check A WordPress Website Security Using WPScan, Nmap, And Nikto...
A Clever Way to Manage Administrative Rights for Regular Users - DeployHappiness
Provide parameters to a command in PowerShell – another way | sepago
Zonemaster
Stay Healthy at Your Desk With These Quick and Easy Stretches
HyperKitty, the next-generation mailing-list archiver — HyperKitty 0.9.4 documen...
Netmagis - Introduction
How to create a custom backup plan for Debian with backupninja - Xmodulo
Welcome to Attic — Attic - Deduplicating Archiver 0.14 documentation
Wiki - SnoopSnitch - SRLabs Open Source Projects
Replace Local Cron With Jenkins - 22 Idea Street
a lo
Shadow Daemon: Introduction
DANE SMTP Validator
Project Calico
Tabula: Extract Tables from PDFs
Farm Hack - An Open Source Community for Resilient Agriculture
Microsoft Volume Licensing - Client Access License (CAL) Guide
The SSIS and Excel Story Continues - Data Access Technologies - Site Home - MSDN...
4 Mistakes to Avoid When Deploying a RADIUS Server
8 advantages of using open source in the enterprise | The Enterprisers Project
How to monitor MySQL database performance using mytop
Testing Strategies - Current Mule Documentation
Mule integration hacks: Mule mockless Integration testing tip, or "in wait for a...
Powershell for Changing AppSettings in Application Configuration File - MiguelNu...
SharePoint and auto statistics guidance - rshetwal - Site Home - MSDN Blogs
Pointless Programming Reference
Free online courses/MOOC aggregator - Class Central
No Excuse List
decac - A higher-level assembly language - Google Project Hosting
Programming Languages - Hyperpolyglot
apenwarr/sshuttle · GitHub
kb0mga.net
Raspberry Pi, GPS and NTP « Small Golden Sceptre
shelving - Nicely mounting 2x4s to wall - Home Improvement Stack Exchange
New Guidance from Microsoft for Packaging and Deploying SharePoint Solutions - V...
Get real - I. M. Wright’s “Hard Code” - Site Home - MSDN Blogs
Friday Fun: Aren’t You Special
6 Foods Scientifically Proven to Increase Your Lifespan
Optimising Raspberry Pi code | Linux User & Developer - the Linux and FOSS mag f...
How To Stress Test CPU and Memory (VM) On a Linux and Unix With Stress-ng
Sharing Admin Privileges for Many Hosts Securely | Linux Journal
Recommended updates and configuration options for SQL Server 2012 and SQL Server...
Free online background check -- Could a specialty consumer report be costing you...
Power Up Your DR with Tintri and SRM! | Virtual Insanity
Army cyber defenders open source code in new GitHub project | Article | The Unit...
USArmyResearchLab/Dshell · GitHub
Penetration Testing with Raspberry Pi - Book Now Available! | . . TheSecurityBlo...
Using PowerShell for Active Directory
Use PowerShell to Find the Location of a Locked-Out User - Hey, Scripting Guy! B...
Importing Photos into Active Directory and Outlook with PowerShell - DeployHappi...
Evolving ASP.NET Apps–Validating Redirects and Forwards - Canadian Developer Con...
Tune, modernise and optimise your website - Martin Kearn - Site Home - MSDN Blog...
Troubleshooting Memory Issues with Reporting Services - CSS SQL Server Engineers...
Small Basic Turtle: Comparing Angle and Turn - User Ed - The blog of Ed Price, C...
Small Basic Turtle: Absolute Motion VS Relative Motion - User Ed - The blog of E...
Small Basic: The History of the Logo Turtle - User Ed - The blog of Ed Price, Cu...
Do I really need to use DTC Transactions? - CSS SQL Server Engineers - Site Home...
Home of SyMenu
#5 The Four Most Powerful Types of Creative Thinking
7 Fun & Weird Things You Can Create With Microsoft Excel
73-Year-Old Man Creates Magnificent Paintings Using Nothing But Excel | Bored Pa...
CAMdrive - Camera & Slider Controller - r-tec
open source multi-axis control for time-lapse photography.
UltraKeet Australia - Filthy Casual - #003 (Hijack your co-workers label printer...
An Overview on SQL Server Checkpoints | Basit"s SQL Server Tips
Libreboot Project
Prometheus
Monitoring System Hardware - Cumulus Linux 2.2.2 - Cumulus Networks
Thousands of Free Business Ideas - Business Opportunities
IPv6 Renumbering – Mission Impossible? « ipSpace.net by @ioshints
The sysadmin skills-path. - SysAdmin1138 Expounds
P e r t u r b . o r g
Securosis Blog | New Paper: Security Best Practices for Amazon Web Services
fcambus/nginx-resources · GitHub
First Line of Defense: Blocking Bad POST Requests Using NGINX Rate Limiting | Fr...
Securosis Blog | Applied Threat Intelligence: Defining TI
122 Things Everyone Should Know About Investing and the Economy
Value Investing Explained in 9 Quotes
sensu/sensu · Puppet Forge
Fix_hdc plugin - The CD Forum
paragres 0.2 : Python Package Index
ROM Download | johnlewis.ie
Assess VM Performance, VM Health and Perform Capacity Monitoring with free tool
ZFS RAIDZ stripe width, or: How I Learned to Stop Worrying and Love RAIDZ » Matt...
vSphere 5.5 | BP.Performance.04 | Storage I/O Control - Data Center Dan
I/O Analyzer – VMware Labs
The Godmother of Virtual Reality: Nonny de la Peña
Esxcli - Thomas-Krenn-Wiki
Howto use ESXCLI in PowerCLI | Virten.net
Friday Fun: Creating Sample Files
2 Post Rack TV Stand | The Server Rack FAQ
Where in I create a lame .bat file for auto restoring a SQL Test DB | Michael El...
Foreign VPN service unavailable in China - Global Times
Five open hardware projects | Opensource.com
How to apply image effects to pictures on Raspberry Pi - Xmodulo
Ideal Backups with zbackup | Linux Journal
Delicious
Follow 10 Inspirational People & Their Personal Journeys Online
pmTrans - Home
Evolving ASP.NET Apps–Password Hashing - Canadian Developer Connection - Site Ho...
The Art of Promise-Based Architecture
Windows policy Lock Pages in Memory option and SQL Server instance in VM | Basit...
How to Perform a CSS Audit: Stylesheets Don"t Have to be Awful - Quick Left
6 free and open source video editing tools | Opensource.com
blender.org - Home of the Blender project - Free and Open 3D Creation Software
Mouse Box
help
Averie Cooks Homemade Peanut Butter - Averie Cooks
30 Ways Magnets Can Help You Stay Clean & Organized | Apartment Therapy
Librem 15: A Free/Libre Software Laptop That Respects Your Essential Freedoms | ...
VirtKick - Take Cloud Back
"Easy Disk Drive Repair" is not what it seems
ioerror/tlsdate · GitHub
PentesterES/Delorean · GitHub
Don"t update NTP – stop using it - Hanno"s blog
PDX DevOps Graphite replacement
Hyperfox HTTP/HTTPs traffic interceptor
Web Scraping with Ruby
The Future: A Cat Litter Box and DRM — Medium
catgenius - Don"t just own your CatGenie, p0wn it! - Google Project Hosting
Simple Directional WiFi Antenna | Hackaday
Deduplication Hidden Downsides - iForensics
Tech Tips: Backups with rsync
To Food with Love: Vegetable Medallions
A Proper Server Naming Scheme | via @codeship
Monitority - FREE Website Uptime Monitoring (Alerts via Email, SMS, Twitter)
Time for sysadmins to learn data science – Donnie Berkholz"s Story of Data
My Philosophy on Alerting
RIP Nagios. Hello Docker Shinken! | www.rohit.io
Monitoring vSphere ESXi servers with Nagios and check_mk plugins. - About monito...
12 of the Best Things Charlie Munger Has Ever Said
LII / Legal Information Institute
CVE security vulnerability database. Security vulnerabilities, exploits, referen...
Gluten Free (and Paleo!) Granola
Western Digital Green HDD, How To Stop Them Dying On You | GamingOnLinux
infosecrockstar.com/wp-content/uploads/2015/01/RockStarV21.pdf
Six Colors: How I rip DVDs and Blu-rays
find
Arduino Thermostat Project
Gizmosnack: Power Plug Energy Meter - Now wireless!
How to Use a Batch File to Make PowerShell Scripts Easier to Run
Step-By-Step: Windows 10 Start Menu Customization via PowerShell - Canadian IT P...
POSHChef/POSHChef · GitHub
HOW TO: Recycle the SQL Server Analysis Services msmdsrv.log File - SQLRockstar ...
ToolsWatch.org – The Hackers Arsenal Tools Portal » 2014 Top Security Tools as V...
Poho"s Blog: On Western Digital hard drives, PUIS and Rocket Raid controllers
Pandoc - About pandoc
Friday Fun: Search Me
Running ASP.NET 5 applications in Linux Containers with Docker - .NET Web Develo...
Blueprintf – A Bluetooth Serial Monitor » Galactic Studios
The Mortgage Professor
What Is Doxing And How Can You Avoid It?
Enterprise device management for Mac, iPad, iPhone, Apple TV | JAMF Software
start [Mailcleaner]
NETCONF YANG tutorial
edX | Free online courses from the world"s best universities
organic fertilizer: Jump to Conclusions About Leap Seconds
kahun/awesome-sysadmin · GitHub
ITIL’s dead elephant: CMDB can"t be done | The IT Skeptic
» Linuxaria – Everything about GNU/Linux and Open source 6 Open Source CMDB
IT Asset Naming Conventions
Drink from the firehose! Implement NetFlow data on your network with nfdump and ...
Network Device Naming Conventions | CCIE Pursuit Blog
www.nunoc.net/nunocweb/services_attchmt/Naming Standard Rev. 1.5.pdf
Device Naming Conventions - NetCraftsmen
Share your network device naming conventions | Network Management | Cisco Suppor...
Network device naming standard | Information Systems & Technology
Device Naming Conventions | The Networking Nerd
https://www.nanog.org/meetings/nanog31/presentations/ringel.pdf
Checking Power Supplies on SuperMicro Servers with Nagios – tummy.com, ltd.
SEP 12.1 & Dos commands | Symantec Connect
Enterprise Support - Symantec Corp. - Windows commands for the client service
Enterprise Support - Symantec Corp. - Available command-line options for smc.exe
racktables-contribs/rt-server-client at master · RackTables/racktables-contribs ...
command line options to disable SEP Policys | Symantec Connect
smc -disable -ntp
Zero Budget IT Admin
CACHE.NDK & BOOKMARKS.NSF | IBM Lotus Tech Blog
cache.nsf & bookmarks.nsf
Deploying PowerShell 4 with Group Policy - 4sysops
Active Directory Maximum Limits Scalability Capacity
Install RackTables on Debian 7 Wheezy | siddou.mynetgear.com
yaplej"s blog: Cloud & Hosted Security
Weekend Scripter: Use the Windows Task Scheduler to Run a Windows PowerShell Scr...
yaplej"s blog: Document Active Directory with GPO Reports
Documenting Active Directory Infrastructure the Easy Way - Ask the Directory Ser...
Active Directory Documents
4 Of The Best Online Sources For Learning Network Security
Sonarr - Dive in
tbaschak/Pantz-PFlog-Stats · GitHub
CLI Book 3: Cisco ASA Series VPN CLI Configuration Guide, 9.1 - Configuring LAN-...
Raspberry Pi DNS/DHCP Server - CiscoDude.Net
Wsus Package Publisher - Home
I had the same problem, solved with this
AttachmentsUseCaption=0 to Notes.ini Delete bookmarks.nsf
Multihoming a Windows Server - NetworkAdminKB.com
ThreatFinder | AlienVault
How To Set up a repository cache with apt-cacher | Debuntu
Learn Python The Hard Way
unix-ninja :: A cheat-sheet for password crackers
The OpenNMS Project
VyOS
www.semicontaiwan.org/en/sites/semicontaiwan.org/files/docs/mitsubishifinal_ke_f...
The SQL Server Sqlio Utility
Download SQLIO Disk Subsystem Benchmark Tool from Official Microsoft Download Ce...
Sensu | The open source monitoring framework.
Stop using Nagios - Andy Sykes - YouTube
A Working Theory-of-Monitoring | USENIX
server - Setting up an anonymous public Samba Share to be accessed via Windows 7...
Ad GUI Copy Selected Groups from one user to another - Script Center - Spicework...
Top 10 Active Directory Tasks Solved with PowerShell | PowerShell content from W...
Add an Active Directory User to the Same Groups as Another User with PowerShell ...
Future DoD SIPRNET VMWARE VIEW | Blah blah blah
Getting Started with Extended Events in SQL Server 2012
VMware KB: VMware support of open-vm-tools
How to benchmark disk I/O : Binary Lane
Taking a deeper dive into VMware thick disks – vBOX | The VBOX
Unattended vSphere Utility Installs - Derek Seaman"s Blog
Luke Maverick: Scripted Install of vCLI & PowerCLI
CA Spectrum SNMP Profile Management | CA Communities
SPECTRUM MIB and SNMP basics
Using vSphere ESXi Image Builder to create an installable ISO that is not vulner...
Updating LSI firmware through the ESXi commandline
Build Custom ESXi 5.5 ISO using PowerCLI | vNelsonTX
RTL-SDR | Hackaday
Automating Windows environments’ setup with Boxstarter and Chocolatey packages
Drawbridge - Microsoft Research
WinCalendar: Calendar Maker & Word, Excel, PDF Calendar downloads
How a $10 USB Charger Can Record Your Keystrokes Over the Air | Threatpost | The...
Active Directory Merger, Acquisition, and Divestiture: Restructuring Limitations
Banana Pi Cluster
OpenBoxes
Linux Basics – LVM (Logical Volume Manager) Tutorial | Ostechnix
Rob Reynolds: Practical Ways to Simplify Windows Administration | Puppet Labs
How To Use Netcat to Establish and Test TCP and UDP Connections on a VPS | Digit...
How to capture and replay network traffic on Linux - Xmodulo
What are useful command-line network monitors on Linux - Xmodulo
Free SSL Certificate with StartSSL and Mac OS X by freshly squeezed
Jobber: A replacement for cron, with sophisticated status-reporting and error-ha...
Getting started with SaltStack
Security Week – Locking down your deployment | Keith"s Consulting Blog
t
DIY Project: Replacing the Stock HP V1910 Fan with Golden Silence - Wahl Network
Why Disaster Recovery Farms are Essential for High-Availability SharePoint - Bui...
COS-461 Syllabus
and Je
OpenContrail is an open source network virtualization platform for the cloud.
PowerShell Magazine » Get started with Pester (PowerShell unit testing framework...
Towards a better console - PSReadLine for PowerShell command line editing - Scot...
Practical PowerShell Unit-Testing: Getting Started
Friday Fun: Updated ISE Scripting Geek Module
wayfair/Graphite-Tattle · GitHub
Ansible for Networking - Jason Edelman"s Blog
The Hacker"s Guide to Python | Julien Danjou
Git-based DNS Hosting [DNS-API.com]
Android IMSI-Catcher Detector (AIMSICD) by SecUpwN
Free Windows Security Tools from www.SecurityXploded.com
Chef Icculus
Demystifying Web-Scale IT | Long White Virtual Clouds
hughsie/gnome-multi-writer · GitHub
How to check memory usage on Linux - Ask Xmodulo
Etherpad - A Real Time Web Based Online Collaborative Document Editor for Linux
How to set up a cross-platform backup server on Linux with BackupPC - Xmodulo
namebench - Open-source DNS Benchmark Utility - Google Project Hosting
Internet Friendly Media Encoder | SourceForge.net
Better Best Bets with Lists in SharePoint 2013 - The Microsoft MVP Award Program...
Microsoft System Center Configuration Manager (SCCM) and Microsoft Deployment To...
Software Library: MS-DOS Games : Free Software : Download & Streaming : Internet...
SAP FICO: Attach Documents to a Journal Entry | WhyPad.com
How To Test Bootable USB
MobaLiveCD - Run your LiveCD on Windows
Test USB and ISO for boot
InfoSec Handlers Diary Blog - Defensible network architecture
Use a load-balancer as a first row of defense against DDOS | HAProxy Technologie...
h
Create a Test Wordpress Instance using Puppet and Vagrant
RapidSSL - Buy SSL Certificates and Wildcard SSL Certificates issued in minutes ...
Why “Puppet vs. DSC” isn’t Even a Thing | PowerShell.org
msutter/dsc · Puppet Forge
Configure HAProxy to Load Balance Sites With SSL
Load Balancing with HAProxy | Servers for Hackers
CLI way of uninstalling a Windows update? - Super User
wusa /uninstall /kb:{updateid}
Microsoft Installer: MSI: Installation and Uninstallation of MSU in silent mode
PowerShell Magazine » Client and patch management using the UpdateServices modul...
The Stony Brook Algorithm Repository
12 Books Every Leader Should Read:Updated - Bob Sutton
Another new Free Software machine: the Acer C720 Chromebook running Debian GNU/L...
SeaBIOS
Windows 7 Issues: Wake-on-Lan (WOL) for Windows 7 Made Easy!
HowTo: Wake Up Computers Using Linux Command [ Wake-on-LAN ( WOL ) ] - nixCraft
Why aren’t we using SSH for everything? — Medium
Powershell script blocks are not closures - Sergey Babkin - Site Home - MSDN Blo...
SQL Server Templates with VMware – Dude Where’s My Drive Letters? | Long White V...
organic fertilizer: how to retrieve your ip address with powershell...
Install NTOP on Debian and Configure to Use NetFlow on Mikrotik RouterOS | Lisen...
Cesanta Software
Use Logcheck to Spot Problems and Security Violations in System Log Files [Linux...
Why Replacing The Fibre Optic Patch Lead Often Fixes Network Problems - Ethereal...
Unreliable Multicast means Unreliable VMware VSAN - EtherealMind
How Many Hosts In An VLAN or IP Subnet and Why ? - EtherealMind
Seth"s Blog: Really Bad Powerpoint
Introducing alertR: Open-Source alerting system - sqall"s blog
Pitivi, a free and open source video editor for Linux
IT owns: Check Microsoft Office 2010/2013 activation type and status. Change fro...
cscript ospp.vbs /dstatus
The Ultimate History Of The Humble Hashtag
New version of the SP 2013 and SP Online solution packs - ISG - Italian SharePoi...
SharePoint 2013 Build number - ISG - Italian SharePoint Group - Site Home - MSDN...
Securely allocating GUIDs in PowerShell Desired State Configuration Pull Mode - ...
In-depth: PowerShell Out-GridView cmdlet | Keith"s Consulting Blog
Copying Configurations across Switches – Cumulus Networks® Customer Support Port...
Network Management and Automation with Chef | Ooyala Engineering
Mae Keane, The Last "Radium Girl," Dies At 107 : NPR
SQL Server 2014 Best Practice: Set built-in Sysadmin(sa) account as an default o...
ircmaxell"s blog: PHP Install Statistics
Website Monitoring with Bash and Nagios Plugins
PhotoSpills Collage Software
Secret Attic Library Door | Hackaday
Get Free Windows Support From These Experts & Communities
sysadvent: Day 25 - Windows has Configuration Management?!?
Sustained power outages in the datacenter | vmPete.com
» The Trouble Connecting vCenter Virtual Appliance to Active Directory Long Whit...
How ICMPv6 Multicast Listener Reports almost spoiled Christmas
Main Page - VickyWiki
Victoria 2 Wiki
Sony Pictures Hacked: The Full Story | . . TheSecurityBlogger . . .
android-screen-monitor - Android Screen Monitor - Google Project Hosting
Automating Display Resolution Configuration in MDT - DeployHappiness
Powershell Host Wizard - Home
Chthonic: a New Modification of ZeuS - Securelist
6 Basic PowerShell Commands To Get More Out Of Windows
Battery Basics – Choosing a Battery for Your Project | Hackaday
Employees are the biggest security risk in the cloud
redhotEngineer"s Blog: Bringing a Router back to life (Modding the Beetel 450TC1...
Wire Wrap 101 | Hackaday
Towards the Perfect Coin Flip: The NIST Randomness Beacon | Hackaday
Temple::USB Device Info - The SZ
Secret CoolReaper backdoor for hackers discovered in Chinese Android phones
Friday Fun: Another Christmas Prompt
The top 10 worst security breaches of 2014
Brothers On C-SPAN Divided By Politics, United In Mortification By Mom"s Call : ...
‘Destover’ Malware Now Digitally Signed by Sony Certificates (Updated) - Securel...
Certificate Life Cycle – A problem for everyone to watch out for
Powershell script to change windows service credentials - BizTalk Tips & Things ...
DNSQuery() Sample To Loop Through Multiple IP Addresses - Windows SDK Support Te...
Docker – a reading list - ThatDependsOnThis - Site Home - MSDN Blogs
How To Write A Resume With The Help Of 8 Ivy School Guides
Mobizen | Your Android, Anywhere
Inside Sony Pictures, employees are panicking about their hacked personal data -...
Executive ego and the Sony Pictures network hack
darktable | the photo workflow software
Defending Windows with Application Whitelisting | Patrick W. Barnes
LGA 771 to 775 Adapter (MOD) - Run faster Xeon CPUs in a Core 2 Quad motherboard
ITProTV
access
Home | WISPA
Powercode.com - The Leader in ISP Billing/OSS
An Unquiet Wiki: Solved an Ubuntu / Debian preseed problem after 3 years...
Dedicated Internet Access
Vulnerability Update for all products 2014 - Secunia
Powerful, highly stealthy Linux trojan may have infected victims for years | Ars...
How to Create Fillable Forms with MS Word 2010
The ‘Penquin’ Turla - Securelist
6. Scale your business at your speed with the cloud… - Microsoft Developer Netwo...
How To Add a Reset Switch To Your Raspberry Pi
Axiom Software - Profile Interpretations - High S and C
Ralph H. Baer, a father of video gaming, dies at 92 - The Washington Post
13 Linux Performance Monitoring Tools - Part 2
nhu12p41.jpg (800×600)
Jumbo Frames and Multi-NIC vMotion Performance over 10Gbe » ValCo Labs
» Installing Cumulus Linux from a MacBook Pro Long White Virtual Clouds
organic fertilizer: PowerShell: Retrieve site location of computer object
25 Best Steve Jobs Quotes
Before The Cat in the Hat, Dr. Seuss Was An Ad Man - Business Opportunities Webl...
10 Books for Aspiring Millionaires - Business Opportunities Weblog
10 Inspirational Quotes from Billionaires - Business Opportunities Weblog
15 Genius Kitchen Storage Solutions
How too many vCPUs can negatively affect your performance - Gabes Virtual World
Sizing VMs and NUMA nodes - frankdenneman.nl
This is what a 12-story fall will do to your iPhone 6 | TUAW: Apple news, review...
splat
Change Default Location for Domain Joined Computers
redircmp
HDMI dongles - active vs passive re-visited - danchar - Site Home -...
Improving Latency in Http Proxy scenario - Sharad Cornejo Altuzar"s blog - Site ...
Two-factor Authentication without the Hassle Factor — Two-Factor Authentication ...
ll sizes.
Set Up SSH Tunneling on a Linux / Unix / BSD Server To Bypass NAT
A Devuan and A-two… | FOSS Force
What is a good free control panel for VPS - Xmodulo
How to install a paravirtualized Xen guest - Xmodulo
The Linux Rain - Building a Desktop Wikipedia Checker
6 Tips for Windows Tablet Owners - Todd Klindt"s SharePoint Admin Blog
HackRF Blue | Software Defined Radio
SQLSaturday #337 View Session Details
Time Blocking -- The Secret Weapon For Better Focus
The Art of Finding Cyber-Dinosaur Skeletons - Securelist
Flash Memory Endurance Testing | Hackaday
The 6 Requirements for Data Center Networks - Plexxi
Enabling a data culture through continuous improvement
Bluetooth 4.2 is here -- chock full of new features
INCS-775 Data Center Security By Dr. Natheer Khasawneh
www.cs.cmu.edu/~dnaylor/CostOfTheS.pdf
0xsauby/yasuo · GitHub
Valerie Maguire"s "De-Mystifying Cabling Specifications From 5e to 7A" - Siemon ...
CoreOS is building a container runtime, Rocket
The Best Web Hosting Services
A Timeline Of The Robots In Films
Build Your Own Wireless Dead Drop For File Sharing
These 3 Types Of Lists Will Help You Be More Productive
Concerned About Copyright? A Guide For Legally Using Images On The Web
Make Every Workday A Rewarding Experience With These Activities
Among Dartmouth"s Lathes And Saws, Lessons In Creativity : NPR Ed : NPR
Finding a fit for autism in testing - SD Times
Want to work at a fun tech company? Practice your social skills. | ITworld
jwz: The CADT Model
This is, I think, the most common
“Serial”: The Podcast We’ve Been Waiting For - The New Yorker
Major Overhaul: How the FCC CIO plans to modernize 207 legacy IT systems | The E...
been
simplicity
Cybercriminals Use Citadel to Compromise Password Management and Authentication ...
11 Useful Utilities To Supercharge Your Ubuntu Experience - OMG! Ubuntu!
Business & Education - Apple Support
Medium"s "Charted" automatically visualizes CSV data - The Changelog
DailyJS: Mermaid: Like Markdown for Diagrams
Securing KeePass with a Second Factor | Kahu Security
GIS Wiki | The GIS Encyclopedia
Configuring Vyatta router for use with my lab environment | Citrix Blogs
VYATTA - The Easy Tutorial - Case Study 10 - Bridging
A user"s SID can change, so make sure to check the SID history - The Old New Thi...
Hacklet 24 – Raspberry Pi Projects | Hackaday
The Myth of the 4-Hour Workweek | SpartanTraveler
HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer
HAProxy Is Still An Arrow in the Quiver for Those Scaling Apps | The New Stack
Load Balancing with HAProxy | Servers for Hackers
Interview with Paul Ramsey of Boundless | Opensource.com
Boundless
Increase Inventory Control with Stitch | Stitch Labs
Boundless, formerly OpenGeo
SendSMTP - Tool to send SMTP email via command-line parameters or interactively
Real World Computing: IBM Notes: 25 Years and Counting...
In The Next Version - Happy 25th Birthday Lotus Notes
On the Menu: Spicy Tamari Tofu & Broccoli - Clementine Daily
18 Ultra Simple Hacks To Make Cleaning Easier | World inside pictures
The Colorful Kitchen - Vegan & Gluten-Free Recipe Blog
The Best Vegan Chocolate Mousse - I Quit Sugar
Sani Seal Toilet Gasket :: No Mess - Waxless – Repositionable
11 top tips to get the most from iPhone 6 and iOS 8.1
How to back up a Debian system using backupninja - Xmodulo
www.itsmfi.org/files/Simple Guide to Creating a Knowledge Base - Allen.pdf
Arduino, circuit boards with a sense of style - CNN.com
5 Tips for Building a Powerful Knowledge Base with Confluence - Atlassian Blogs
Gaining experience with encryption and key rotation - Terry Zink: Security Talk ...
My homemade Raspberry Pi smart thermostat - Imgur
Windows Gets A Package Manager - Download Software Centrally Via OneGet
1. The Pi Plane Project | Simon Aubury.com
Scott Forsyth"s Blog - URL Rewrite vs. Redirect; What’s the difference?
Xshell is a one-stop SSH, SFTP terminal emulator
Scott Forsyth"s Blog - Why is the IIS default app pool recycle set to 1740 minut...
recommend setting to a fixed time like 4:00am if you’re on the East coast of
11 "Avconv" Commands to Record, Convert and Extract Videos & Audios from Linux T...
check_vmware_snapshots – ConSol* Labs
The top 8 new OpenStack tutorials | Opensource.com
Top 20 Practical Cabling Tips for Network Engineers - Part Two - EtherealMind
10 Sed (Stream Editor) Command Examples
Host-Named Site Collections | SharePoint Administration content from SharePoint ...
12 lessons for entrepreneurs that Steve Jobs taught Guy Kawasaki | TUAW: Apple n...
Tech Notes: Difference Between OS1 and OS2 Fibre Optic Cable - EtherealMind
www4.ncsu.edu/~rhee/clas/csc495j/ip-multicast-part1.pdf
Cisco Layer 2 Switching with Multicast and IGMP Snooping
www.michaelfmcnamara.com/files/scripts/multicast.py.txt
Math Symbol Hierarchy - Murray Sargent: Math in Office - Site Home - MSDN Blogs
Powering up Powershell for Remote Desktop Services - Windows SDK Support Team Bl...
Data-Driven Quality explained – part 1: questions? what questions? - Your Softwa...
sed in PowerShell - Sergey Babkin - Site Home - MSDN Blogs
suckless.org st - simple terminal
New Tool: Chocolatey Application Wrapper for MDT | Keith"s Consulting Blog
Are Your Home Security Cams Being Streamed Online Without Your Knowledge?
Are E-Cigarettes Harmful To Your Computer"s Health?
Open Security Operations Center
bup, it backs things up!
vyatta transparent firewall | Zivo NiX BLog
Vyatta 6.1: Bridging The Cloud | Kelly Herrell"s Blog
Engineering Radio
LasLabs | Ubiquiti EdgeRouter - Active Directory Authentication - LasLabs
www.threatstop.com/sites/default/files/documents/HOWTO-vyatta-bridge.pdf
Vyatta Firewall Basics and Configuration | Read The Effin" Blog
5 Ways To Remote Control Your PC With Power Or Wake On LAN
How To Reset Your Mac"s SMC & PRAM – And Why
BadUSB – The Unpatchable Malware That Infects USBs Is Now on the Loose : netsec
The facts about BadUSB | NCC Group
BadUSB attack update: only half of chips are vulnerable...but it probably won"t ...
Badusb | LinkedIn
Sourcecode for "unpatchable" USB exploit now on Github - Boing Boing
BadUSB hack may be one of the biggest threats you have seen!
What You Need to Know About BadUSB - Security News - Trend Micro USA
S21sec Security Blog: The real danger of BadUSB
What BadUSB Is and Isn’t | Plugable
Big Mess o" Wires » BadUSB and the Hidden Microcontroller
Unpatchable BadUSB Code Is Now Publicly Available | Optimal Security: The Lumens...
Fear BadUSB? RGB Spectrum Has An Answer | RGB Spectrum
malware - How to identify which storage USB device is BadUSB-free at store? - In...
When Good USB Devices Go Bad
BadUSB Malware Code Released — Turn USB Drives Into Undetectable CyberWeapons
On The Ethics of BadUSB - Adam Caudill
Karsten Nohl BadUSB Patch Fall Short of a Fix | Threatpost | The first stop for ...
Types of Cybercrime, Fraud, Acts and Preventive Measures
Vagrant – Development Environments Made Easy | Ubuntu Geek
Using Nginx as a Reverse Proxy to Get the Most Out of Your VPS. | Ubuntu Geek
How to disable Webcam in Windows 8 / 7 laptop
BadUSB – now with Do-It-Yourself instructions | Naked Security
Patch for BadUSB unleashed: How to protect yourself from this new cyberweapon : ...
The BadUSB exploit is deadly, but few may be hit | InfoWorld
Why the Security of USB Is Fundamentally Broken | WIRED
Only Half of USB Devices Have an Unpatchable Flaw, But No One Knows Which Half |...
The Unpatchable Malware That Infects USBs Is Now on the Loose | WIRED
How to install Cacti (Monitoring tool) on ubuntu 14.10 server | Ubuntu Geek
7 Steps To Install And Optimize Minecraft For Linux
DorkbotPDX | people doing strange things with electricity
Better SPI Bus Design in 3 Steps | DorkbotPDX
Seth"s Blog: A three-step marketing ladder
GreatFire.org and BBC punch uncensored news through the Great Firewall of China
Web Hosting Benchmarks & Coupons
Ingemar Ceicer - ceicer.org
Obscurity is a Valid Security Layer
The Awesome Program You Never Should Use | Linux Journal
The Black Magic Of SSH / SSH Can Do That? on Vimeo
E-cigarettes can damage your PC"s health
Regin: Nation-state ownage of GSM networks - Securelist
China just blocked thousands of websites | GreatFire.org
Serve websites with Nginx | Linux User & Developer - the Linux and FOSS mag for ...
AngularJs – Introduction | SharePoint Rider
Synchronize Your Life with ownCloud | Linux Journal
Checking Active Directory Replication Using PowerShell
How to Configure and Use a PowerShell Profile - Obscurum per Obscurius - Site Ho...
Managing mobility in the age of BYOD
A Modern Woodworking Workbench | Hackaday
The Easiest Raspberry Pi Media Centre, With RasPlex
Static DOM XSS Scanner | /dev/null
Resist Surveillance
Assembly
Boost Your Productivity With Windows PowerShell Scripts
Purging Audit Data w/ PowerShell - MOSSy Business - Site Home - MSDN Blogs
Harnessing the Power of both worlds - SQL BI - Site Home - MSDN Blogs
Martin Melchior"s homepage: Configure your WR703n with a switch (or two)
WR703n
Martin Melchior"s homepage: Make your Raspberry pi b more power efficient with a...
gozoinks/unifi-pfsense · GitHub
Release Management as a Service - Musings on ALM and Software Development Proces...
10 pidstat Examples to Debug Performance Issues of Linux Process
The 8-hour rule is bunk: Why conventional wisdom about sleep is stressing us out...
Is there any method to protect your self from BadUSB on linux? : linux
"BadUSB" Exploit Makes Devices Turn "Evil" - Slashdot
Chris’ Miscellanea: Controlling USB device access on Linux (e.g. BADusb defense)
usb - How to prevent BadUSB attacks on linux desktop - Information Security Stac...
An Introduction to OpenGL Programming | Linux Journal
The Infinite Hows (or, the Dangers Of The Five Whys) | Kitchen Soap
A way to retrieve SQL statement from SharePoint native call stack - Michael Li -...
7 Unique Ways To Practice Your Coding Skills
Mask all important passwords in all MDT logs - AlexSemi"s Blog - Site Home - MSD...
www.andrewoswald.com/docs/NovArtzGoodallOswald2014.pdf
Sample MDT Web Service | Keith"s Consulting Blog
Customizing Your Windows Deployments | Keith"s Consulting Blog
From the Prototype to the Final Device | Lucky Resistor
SAP Knowledge Base: SAP Process Flow
Three Risks of Skimping on Training - The Many Faces of Mike McBride
the case for it
Chemistry - PhET Simulations
How to install (and upgrade to) Android 5.0 Lollipop on Nexus 4, 5, 7, 10
Products
VSUsbLogon
Transfer notes from an iPhone to a Windows PC
Manawyrm/FMBerry · GitHub
Beginner"s Electronics: 10 Skills You Need to Know
xposed wires and solder-points can create shorts. Applying electrical tape or heat shrink tape in tight enclosures sometimes won’t fit. Liquid electrical tape fi
The 5 SMART stats that actually predict hard drive failure | Computerworld
SMART 5 - Reallocated_Sector_Count. SMART 187 - Reported_Uncorrectable_Errors. SMART 188 - Command_Timeout. SMART 197 - Current_Pending_Sector_Count. SMART 198 - Offline_Uncorrectable
Stuxnet: Zero Victims - Securelist
Pi-Top launches: Get your own DIY Raspberry Pi laptop for $285
Intro to Systemd Runlevels and Service Management Commands | Linux.com
Putt"s Law Quotes - The Quotations Page
Visualize Your Data & Make Your Spreadsheets User Friendly With An Excel Dashboa...
Working With CSV Files In Ruby 1.8.7 Without FasterCSV - Alex Scoble"s IT Notes ...
Learn Angular.JS
Joyent Private Cloud - Products - Joyent
The 200 Best Entrepreneurship Quotes Ever - Business Opportunities Weblog
The Ultimate History Of Card Games
How to deregister your phone number from iMessage and take your texts back — Tec...
How to Record Your Desktop Video and Audio Using "Avconv" Tool in Ubuntu
Avconv
Make full screen sections with 1 line of CSS — Medium
Build Cheat Sheets and Share Your Favourites! - Cheatography.com: Cheat Sheets F...
5 Awesome Open Source Backup Software For Linux/Unix/OS X and Windows Systems
CONFESSIONS OF AN ACCIDENTAL SECURITY TESTER - "I DIDN"T BREAK IN, YOU LEFT THE ...
Confessions of an Accidental Security Tester
Nimble HR - Modern Hiring For Growing Businesses
Trial : Install SAP ERP 6 Ehp 5 with DB2 10.5 on SLES 12 using btrfs « SAP Basis...
Crypto 101
How To Improve the IT-Business Relationship - J.D. Meier"s Blog - Site Home - MS...
Best Practices for Higher Availability & Recovery (IaaS) - En un Lugar de la Nub...
PiFox • Hackaday Projects
Security Holes in Corporate Networks: Network Vulnerabilities - Securelist
Sweet Orange Web Exploit Kit | . . TheSecurityBlogger . . .
Videos |
In South Carolina, A Program That Makes Apprenticeships Work : NPR
At Cooper Standard, Harris is using his Air Force background as an electrician to learn an occupation called mechatronics. It"s a fairly new kind of job in manufacturing — a utility player on the factory floor with myriad skills. "They know a little about programming, they can work with automation," says Warren Snead, Harris" boss. "They know the basics of wiring, hydraulics, pneumatics — so really a Superman or Superwoman who can do everything." In other words, it"s someone who"s able to fix just about anything at a plant — and the kind of job that can"t be sent to a faraway country. Recently, Harris installed sensors for an alarm system. Four nights a week he attends a welding class. And he"s feeling pretty good about the direction his life has taken since leaving the Air Force.
iPhone Malware Spreads, Spotify Beats iTunes, Free Nest Thermostats [Tech News D...
People Don"t Just Want Tools - The Many Faces of Mike McBride
Founder stories: "People don"t want drills" | VentureBeat | Entrepreneur | by Ni...
Serious Tools. For Serious Collaboration. | Metalogix
5 things your CIO needs to know about identity
Thanksgiving vs. Black Friday vs. Cyber Monday: What to Buy Each Day
Overview - D Programming Language
DNS Zones for SharePoint Apps? - rshetwal - Site Home - MSDN Blogs
How to create a Windows Firewall Inbound Rule - To BizTalk and Beyond! - Site Ho...
Download PerfView from Official Microsoft Download Center
Regular Expressions - Searching for SSN Numbers Across Text Files
How to Organize Your Refrigerator Drawers and Shelves - Real Simple
Collector"s desire Achievement in Port Royale 3
Unix: Beyond owner, group, and everyone else | ITworld
Shell Scripting - Checking Conditions with if
Bob Young talks about the origins of Red Hat | ZDNet
"Customers are like your kids, they say they "need" ice-cream, but that"s what they want; what they really need is spinach. You need to understand the customers" needs better than they do."
All Things Open
Collection of Useful Bash Functions and Aliases | TuxArena
jaymedavis/hubble · GitHub
Ship List (New)
Understanding the cloud
Run Best Practices Analyzer Scans and Manage Scan Results
Offline Patching with help from MDT | Keith"s Consulting Blog
Cable Management Tools & Network Cables from SergeantClip
Scary PowerShell
WR Series, Roll Out Rotating Rack
Having Friends At Work Is Incredibly Important And Here"s Why
7 Non-Geeky Skills Every Geek Should Have
Skills for the non geek.
Powershell DSC ResKit Wave 8: Now with 100 Resources! - Windows PowerShell Blog ...
www.measurementlab.net/static/observatory/M-Lab_Interconnection_Study_US.pdf
Re-Size The Distributed Cache Service In SharePoint 2013 | Richard Skinner
Useful deployment links - Michael Niehaus" Windows and Office deployment ramblin...
Dovestones Software Active Directory Tools
adLDAP - LDAP Authentication with PHP for Active Directory
Shall we fork Fedora?
Maybe we"re not veteran enough?
Roll up your sleeves, we may need to fork Debian.
Library Index | Survival Library
Open source NAC solution PacketFence 4.5.0 released
The Linux Rain - Memo - Note Taking, Unix-style
organic fertilizer: Preparing for the End of Windows Server 2003
Networking"s atomic unit: Going small to scale up - Plexxi
To scale larger, technology has time and again become more atomic and adopted more distributed architectures. The 1990s were about storage’s transition, the 2000s about compute’s transition, and the 2010s are going to be about networking’s transition. - See more at: http://www.plexxi.com/2014/10/networkings-atomic-unit-going-small-scale/#sthash.JawW7F1U.dpuf
Fxos on RaspberryPi - MozillaWiki
Genetically Modified Organisms Risk Global Ruin, Says Black Swan Author — The Ph...
What is FAIR? - CXOWARE
Schneier on Security: Virginia Tech Lesson: Rare Risks Breed Irrational Response...
eDiscovery Daily Blog: Those Pesky Email Signatures and Disclaimers - eDiscovery...
How To: Debug missing Drivers in MDT (LiteTouch) | Keith"s Consulting Blog
12 Words From Warren Buffett That Can Mint You a Fortune
"Be fearful when others are greedy and greedy when others are fearful."
Asuswrt-Merlin - custom firmware for Asus routers | Merlin"s Tower
GoDaddy Updates Hosting Platform as Cloud Alternative
The cloud is not the panacea for all hosting and application delivery needs. GoDaddy is going another route.
PowerTip: Determine PowerShell Version - Hey, Scripting Guy! Blog - Site Home - ...
$PSVersionTable
5 Brilliant Online Resources For Fans Of Terry Pratchett"s Discworld
The history of JavaScript, as told by Douglas Crockford - Dave Voyles | Tech Eva...
Understanding AutoSPInstaller: What you need to know
Blogs - Steve Chen [MSFT] Sr. Support Escalation Engineer - Site Home - TechNet ...
Install SharePoint 2013 SP1 using AutoSPInstaller - Jonas Widriksson
-GetPrerequisites $true
AutoSPSourceBuilder - Home
SharePoint 2013 Service Accounts Best Practices by Vlad Catrinescu
Make better share point stuff with an agile methodology
Video: MDT 2013 log files basics (bdd.log and smsts.log) | Keith"s Consulting Bl...
How to scan Linux for vulnerabilities with lynis - Xmodulo
TechNet Download and Install SharePoint 2013 Prerequisites on Windows Server 201...
Filtering PowerShell Objects | PowerShell content from Windows IT Pro
Script Show Installed Windows Roles and Features
Import-module servermanager ; Get-WindowsFeature
Netdiscover - Active/Passive network discovering tool
activised arpwatch
An incompatible SQL Server version was detected - SQLRockstar - Thomas LaRock
How to turn your CentOS box into a BGP router using Quagga - Xmodulo
How to Hack Your Own Network and Beef Up Its Security with Kali Linux
Tech Notes: Ping Sweep an IP Subnet - EtherealMind
Learning Shell Scripting Language: A Guide from Newbies to System Administrator
Tracking a Bitcoin Thief pt. I:
ZTIWindowsUpdate.wsf fix … Part II | Keith"s Consulting Blog
Debugging : The 9 Indispensable Rules for Finding Even the Most Elusive Bugs - W...
Tim Berners-Lee & the trends driving the Web"s future - Microsoft UK Government ...
Please Do Not Leave A Message: Why Millennials Hate Voice Mail : All Tech Consid...
Make Your Own Wireless Printer With A Raspberry Pi
Shellshock BASH Vulnerability Tester
How You Can Avoid a BadUSB Attack
Turning USB peripherals into BadUSB | Security Research Labs
5 Deadly Linux Commands You Should Never Run - The Epoch Times
Iron.io Blog: Docker in Production — What We’ve Learned Launching Over 300 Milli...
What are useful Bash aliases and functions - Xmodulo
Amazing ! 25 Linux Performance Monitoring Tools
All You Need Are Two Top-of-Rack Switches « ipSpace.net by @ioshints
SQL–More memory and CPU is not always a win - mfp"s two cents - Site Home - MSDN...
There Is No Configuration Management Special Sauce — Steven Murawski
Red / Green: GP Preferences | System Admins
computer
Digita Vaticana | Digitalizzazione Manoscritti Biblioteca Vaticana
What Are the Five FSMO Roles
Payroll Medics Blog
UniFi - Lost password and username recovery - Ubiquiti Networks Community
Published for the First Time: a 1959 Essay by Isaac Asimov on Creativity | MIT T...
Read speeds dropping dramatically on older files; benchmarks needed to confirm a...
Samsung delivers fix for SSD slowdowns | Computerworld
Maybe?
10 Simple Ways to Lower Your Cholesterol
Psyllium Fiber
Deploy Google Chrome for Work with Group Policy - DeployHappiness
Scripting an Internet Explorer window - The Old New Thing - Site Home - MSDN Blo...
PowerShell and SQL Stored Procedure - The Microsoft MVP Award Program Blog - Sit...
SharePoint & SQL Server AlwaysOn Failovers – Video Demonstration - Build on Shar...
From the MVPs: PowerShell and SQL Stored Procedure - Microsoft Press - Site Home...
TL;DR Wikipedia
Tablets: Quest for the enterprise
Got 10GbE working in the lab–first good results | vNetWise
Errata Security: Some POODLE notes
How to monitor and troubleshoot a Linux server using sysdig - Xmodulo
How To Create Secure Communication Channel with Putty
How to Control Your Linux System Just with Your Head and a Webcam - Softpedia
How to check hard disk health on Linux using smartmontools - Xmodulo
Vagrant | Linux Journal
Python tuples: immutable but potentially changing - O"Reilly Radar
CipherShed | Secure Encryption Software
VeraCrypt - Home
Filtering HTTPS Traffic with Squid on pfSense 2.1.5 | sichent
11 Useful, Genius Math Tricks That Are Actually Easy
People Who Love Expanding Their Minds Do These 13 Things — Do You?
Welcome | MIRcon 2014
WSUS GPO Settings for the real world - Spiceworks
SSL broken, again, in POODLE attack | . . TheSecurityBlogger . . .
Configuring OMD for LDAP (Domain) Authentication UPDATE | sitweak
Multisite LDAP intregration
Raible Designs | Developing Services with Apache Camel - Part IV: Load Testing a...
Integrate SharePoint 2013 with Team Foundation Server 2013
Letter to David Wilson and Howard Chu regarding Python-LMDB
In-Memory Microbenchmark (Scaling)
Active Directory files and their functions - servergeeks - Site Home - MSDN Blog...
Using Event viewer custom views for troubleshooting - vimalsdesk - Site Home - M...
Extended vbs to start/stop all BizTalk host instances in several servers - BizTa...
Nmap NSE script for detecting POODLE-vulnerable servers (SSLv3 with CBC ciphersu...
Don"t overlook the most important cloud storage feature: Security
Fed Up Of Inefficient Meetings? Send These 8 Rules To Your Boss
How To Learn Color Theory In Less Than One Hour
How To Improve Your Programming Career Opportunities
10 Amazingly Useful Spreadsheet Templates To Organise Your Life
Impressive Internet Facts That Are Sure to Blow Your Mind! - Host Advice
Open General | SourceForge.net
Easily Set Up Trade Convoys in Port Royale 3 - Redirect
Steam Community :: Guide :: Complete Walkthrough of Port Royale 3 Trade Campaign
[Strategy] Tips and Tricks
Organizations struggle to balance security with systems integration
Create Copy of Web Site on Same Server or Remote Server using Web Deploy - Eric ...
Network Design -- Keeping it simple | Router Jockey
The Fappening: A Wake-Up Call for Cloud Users | . . TheSecurityBlogger . . .
Theory of Constraints and common staffing mistakes - Plexxi
Managing Local Group Memberships with Group Policy Restricted Groups - DeployHap...
Six ways consumer software can revolutionize your IT
How Millennials Are Reshaping Charity And Online Giving : All Tech Considered : ...
The Snappening: Hundreds of Thousands of Snapchats May Have Been Leaked
34 Tips To Help You Ace Your Next Job Interview
Visualizing Your SharePoint Farm with PowerShell - The Microsoft MVP Award Progr...
VeraCrypt a Worthy TrueCrypt Alternative - eSecurity Planet
Applying the Theory of Constraints to network transport - Plexxi
Open WhisperSystems
Four short links: 13 October 2014 - O"Reilly Radar
What"s Happening above Your Head? | Linux Journal
2014/7169 aka ShellShock - c0t0d0s0.org
13 Billing Tips for Keeping Clients Happy - Divorce Discourse
Video Streamer | Jaruzel.com
Better Living Through Robotics
What is the right connected garage door opener to buy? — Tech News and Analysis
Radio TFS and the GREAT curve ball question about (ex-nightmare) shorter deliver...
Backup Hard Drives: Expect Failure and Plan Accordingly — My Money Blog
e last drive was limping along. I turns out there isn’t that
Dependency management and organic IT integrations - Plexxi
Seth"s Blog: Four steps on the road to organizational growth, dominance or irrel...
Using SignalR to power ASP.NET Dashboards, Part 2 - Jerry Dixon"s Blog - Site Ho...
Using SignalR to power ASP.NET Dashboards - Jerry Dixon"s Blog - Site Home - MSD...
Your USB Devices Aren"t Safe Anymore, Thanks To BadUSB
8 Daily Rituals You Can Create To Boost Your Geeky Productivity
Cambridge Audio Bluetone 100: Room-filling, thrilling sound | TUAW: Apple news, ...
Has Your Data Gone Rogue? - SQLRockstar - Thomas LaRock
@JKevinParker: How to Leverage SharePoint 2013 to Organize, Label, Navigate, and...
Smartphone simulators | SharePoint Dragons
Call Page button click event using PowerShell | SharePoint Rider
Slides and Scripts from DogFood Conference 2014
OneTab extension for Google Chrome and Firefox - save up to 95% memory and reduc...
Doc Searls Weblog · Cavalcade of Tabs
CoreOS: Open Source Future of Enterprise Computing? - Technology Blog and Commun...
OpenMediaVault 1.0 review | LinuxBSDos.com
TrueCrypt Getting a New Life - eSecurity Planet
HDMIPi Raspberry Pi displays are shipping now! Touch screens and 10" model in th...
HDMIPi
Understanding and Using Systemd | Linux.com
How to use logrotate to manage log files in Linux - Xmodulo
How to monitor online prices on Linux - Xmodulo
[Phoronix] Uselessd: A Stripped Down Version Of Systemd
Wal Commander GitHub Edition | Multi-platform open source file manager for Windo...
Run Unix Commands in vi and vim editor
Only FOSSers "Get" FOSS | FOSS Force
How to monitor user login history on CentOS with utmpdump - Xmodulo
3 great scanner tools for Linux | Opensource.com
Attack a website using slowhttptest from Linux and Mac - darkMORE Ops
How to manage configurations in Linux with Puppet and Augeas - Xmodulo
Another 5 command line tips | Raspberry Pi Today
How to turn your CentOS box into an OSPF router using Quagga - Xmodulo
Hands-on review: Probox2 EX Android 4.4 TV box ·  LinuxGizmos.com
Using GIT to backup your website files on linux -
Phabricator - An Open Source Powerful "Project Management" Tool for Linux
Teaching kids game design with open source software | Opensource.com
How to set up RAID 10 for high performance and fault tolerant disk I/O on Linux ...
Open Source Lessons Learned: Two Years of Telescope - Telescope
2 Free CAD Programs for Linux: DraftSight and QCAD | TuxArena
Secure Linux Systems Require Savvy Users | FOSS Force
Uber Home Automation w/ Arduino & Pi
pcDuino SBC adopts i.MX6 Quad, loads up on storage ·  LinuxGizmos.com
How to configure HTTP load balancer with HAProxy on Linux - Xmodulo
What is good reference management software on Linux - Xmodulo
Dtrx - An Intelligent Archive Extraction (tar, zip, cpio, rpm, deb, rar) Tool fo...
Nginx, SSL & php5-fpm on Debian Wheezy | IO Digital Sec
InfoSec Handlers Diary Blog - Testing for opened ports with firewalk technique
InfoSec Handlers Diary Blog - Detecting irregular programs and services installe...
Errata Security: Two Minutes of Hate: Marriot deauthing competing WiFi
Errata Security: Who named "shellshock"?
Errata Security: Wget off the leash
Errata Security: Six-month anniversary scan for Heartbleed
Seize a FSMO Role with NTDSUtil
PowerShell Dates, Times and Formats
Friday Fun – Take a Chance with PowerShell
Are Haskell engineers second-rate? (Answer: no.) | Michael O. Church
Raspberry Pi As A Hacking Arsenal | . . TheSecurityBlogger . . .
Refactoring for Performance
organic fertilizer: using netsh to capture packets
[H]ard|Forum - View Single Post - BigAdv with Opteron 8300/8400 chips.
The Forgotten Female Programmers Who Created Modern Tech : All Tech Considered :...
Virtualization Concepts Part1 - Virtualization Concepts Part 1 - Site Home - MSD...
Programming Arduino in Visual Studio with Visual Micro - Canadian Developer Conn...
Part 4: Get started with Python: Object Oriented Approach - Canadian Developer C...
Part 3: Get started with Python: Functions and File Handling - Canadian Develope...
Part 2: Get Started with Python - Canadian Developer Connection - Site Home - MS...
Convert SID to User Name using PowerShell - Michael Pedersen"s Blog - Site Home ...
SharePoint Pod Show
Installing dll into GAC with PowerShell - MiguelNunez - Site Home - MSDN Blogs
10 Helpful Spreadsheet Templates To Help Manage Your Finances
Clinton Documents: 7 Excerpts You Should Read : The Two-Way : NPR
Bufferbloat Killed my HTTP Session… or not? « ipSpace.net by @ioshints
BadUSB Means We’re All Screwed
CP/M Source Code Released
Hackaday 10th Anniversary: [1o57] and the Art of Encryption
Flashback Friday: How two Stanford University whiz kids accidentally built Googl...
Flashback Friday: How two university dropouts created Microsoft
Intel Underestimates Error Bounds by 1.3 quintillion | Random ASCII
fsin
AnandTech | An Introduction to Semiconductor Physics, Technology, and Industry -...
OpenClonk
MichaelJCole/bithammer · GitHub
Web Deploy 3.5: The Official Microsoft IIS Site
about
eurysco
eurysco – Download
Why Go is elegant and makes my code elegant | PyTux
adamcaudill/Psychson · GitHub
Cables, Transceivers and 10GBASE-T - Plexxi
Marriott Gets Caught Blocking Mobile Hot Spots - The Many Faces of Mike McBride
OPSec for security researchers - Securelist
Windows 10 Technical Preview - Games for Windows and the DirectX SDK - Site Home...
Fun with PowerShell: Part 1 – Loading Demo Data - Bluewater SQL - Site Home - MS...
Provision a Home Directory for new Accounts - the Connector Space - Site Home - ...
Memorize Anything Using Active Recall Memory
The supercapacitor UPS for Raspberry Pi and for industrial, automation, IoT, and...
InfoSec Handlers Diary Blog - Security Onion news: Updated ShellShock detection ...
InfoSec Handlers Diary Blog - Shellshock: Vulnerable Systems you may have missed...
Little-Known Punctuation Marks That Need To Make A Comeback
GlassWire Network Security Monitor & Firewall Tool
Computer_hardware_poster_1_7_by_Sonic840.png (1280×1813)
Errata Security: Do shellshock scans violate CFAA?
Errata Security: Masscan does STARTTLS
Presentations - ipSpace.net by @ioshints
The curmudgeon"s guide to Microsoft"s embryonic Windows 10
Shellshock -- we ain"t seen nothing yet
Windows 10: Command Prompt"s experimental new features are genuinely useful
The IBM Desktop Utility for Lotus Notes Clients | IdoNotes (and sleep)
dsktool.exe
InfoSec Handlers Diary Blog - CSAM: The Power of Virustotal to Turn Harmless Bin...
TIOBE Software: Tiobe Index
Evil Tester: An exploratory testing example explored: Taskwarrior
NirSoft"s OpenSaveFilesView displays recently opened and saved files
How to install Windows 10 Technical Preview on Oracle VirtualBox
How to create a bootable Windows 10 Technical Preview USB drive
Roku learns a new trick -- Introduces Screen Mirroring Beta for Android and Wind...
Errata Security: Bash "shellshock" bug is wormable
InfoSec Handlers Diary Blog - What has Bash and Heartbleed Taught Us?
Bourne-Again Shell (Bash) Remote Code Execution Vulnerability | US-CERT
Taskwarrior - What"s next?
Errata Security: Bash "shellshock" scan of the Internet
Saving a read-only file edited in vi / vim | GeekyBoy.com
wissel.net :: Keeping up with all the GIT
wissel.net :: Creating nginx configurations for Domino SSL
Breaches in corporate network protection: access control - Securelist
I don’t need no stinking firewall ... or do I? « ipSpace.net by @ioshints
iPhone 6 and 6 Plus teardowns reveal internal details
Will you be prepared if disaster strikes?
The Internet of Things -- Chasing the waves
Home – Simply Secure
Automate processes for a sustainable supply chain
www.securingthehuman.org/newsletters/ouch/issues/OUCH-201410_en.pdf
Cumulus Linux: First Impressions - PacketLife.net
The best CRM software as selected by business professionals
Securosis Blog | Why the bash vulnerability is such a big deal (updated)
Estimating Hidden Bug Count -- Part 1/3 - Eugene Bobukh"s WebLog - Site Home - M...
EDI Line Item Data | [The Integration Engineer]
Friday Fun – Does Anyone Really Know What Day It Is?
Friday Fun: Pick Up Milk
Hacker School
Export SharePoint Solution Packages from the Farm | SharePoint Voodoo
Installing SharePoint 2010 Language Packs with PowerShell | SharePoint Voodoo
Working with CSV files in PowerShell | SharePoint Voodoo
Shellshock / Bash bug – 22 year internet vulnerability could be the biggest yet ...
Uploading files to SharePoint with PowerShell and Web Services | SharePoint Vood...
Use Power to get MSI Properties | Keith"s Consulting Blog
PowerCLI and the Linux Shellshock vulnerability - LucD notes
Document Choreography of an EDI Purchase | [The Integration Engineer]
Why is Dell crippling its low end server RAID cards?
6 Smart Interior Air Quality Monitors You Should Buy For Your Home
Virtual reality is coming to the workplace and it may be sooner than you think
Everyone should be a maker. So how do we get there? — Tech News and Analysis
Funders and Founders - Visual Startup Blog
Live Tile Framework for SharePoint
How To Pick A Color Scheme Like A Pro
IT Systems Resiliency 101: What it means and 5 ways SMBs can adopt it
Shellshock Bash bug could be bigger than Heartbleed
Shellshock Bash -- What every business needs to know
organic fertilizer: powershell: reset user password
organic fertilizer: powershell: limitation on retrieving members of a group
The Fappening -- 3 things we can learn from the celebrity nude photo leak
Cool Tools – Handy Paint Pail
Content Centric Networking and a tour of (Xerox) PARC
Mind, hands, and heart: John Leeke on Internet video for sharing knowledge about...
A cost-effective way to winterize windows | Jon Udell
9 Free Programming Books That Will Make You A Pro
Use Your iPad As A Recipe Book? 10 Accessories For Kitchen Tablet Users
5 Things Users Tell IT Support and What They Really Mean
Performance Quiz #14: Memory Locality, x64 vs. x86, Alignment, and Density - Ric...
Finally... JavaScript source line info in a dump - PFE - Developer Notes for the...
.NET Just in Time Compilation and Warming up Your System - I know the answer (it...
Subsystem for UNIX-based Applications is not affected by Shellshock - Services f...
Not vulnerable but no bash.
Simple REST api for Executing PowerShell Scripts - Windows PowerShell Blog - Sit...
Nobelist Muhammad Yunus: Be A Go-Getter, Not A Job Getter : Goats and Soda : NPR
On The Cusp: 11-Year-Olds Around The World Share Their Wisdom : Goats and Soda :...
How To Spark Personal Growth: 5 Tricks Of The Entrepreneur
How To Monitor Your Car"s Performance With Android
Learn 10 Simple Self Improvement Tips In 10 Minutes [Stuff to Watch]
OBD2 & Windows: Save On Auto Repair With Diagnostic Tools
Shellshock and its early adopters - Securelist
“Bash” (CVE-2014-6271) vulnerability – Q&A - Securelist
quux.de and DNSSEC | Jens" BLOG
Li-ion battery charging
How A Mastermind Group Can Help You Achieve More Goals
Jobs Of The Future: Where They Are, How To Get Them - Microsoft MVP Mentor Blog ...
2014
Troubleshooting SharePoint Event ID 6393 - Build on SharePoint - Site Home - MSD...
Event ID 6393
Get-spfarmconfig has misleading value - laleh - Site Home - MSDN Blogs
Get-spfarmconfig
Potential data latency with AlwaysOn Availability Groups and Memory Optimized Ta...
Using signed PowerShell scripts with configuration items and applications - Adam...
SharePoint 2013 On-Prem reset index stuck resolution - Kristopher Loranger - Sit...
Continuing the DSC Resource Kit Additions – Wave 7 is Live - Windows PowerShell ...
IBM Domino Servers STILL don"t support SSL SHA-2 Certificates - and it is about ...
Biohacking: The Creepy but Exciting Trend in Body Modification
Strange issue when enabling AlwaysOn AG feature in SQL 2014 - Esoteric - Site Ho...
Information for My Beginning Programming Course Using Python - Vance Morrison"s ...
Bash specially-crafted environment variables code injection attack | Red Hat Sec...
ASP .NET Authentication : OWIN middleware component for browser based sign-on us...
New DocumentDB quotas - Azure DocumentDB Team blog - Site Home - MSDN Blogs
Evolving ASP.NET Apps – Evaluating the Code - Canadian Developer Connection - Si...
CVE-2014-6271: Bash lets you do bad things. (Shellshock) | Invisible Threat
Apt-Cacher on Ubuntu Trusty | UNIX Administratosphere
VMware KB: Download URLs for VMware vSphere Client
PowerCLI in the vSphere Web Client–Announcing PowerActions - Virtu-Al.Net
How to rebuild WMI classes on Windows 2003 - AsiaTech: Microsoft APGC Internet D...
Apache OpenMeetings Project – Home
Post-It To Your Screen - 6 Sticky Note Apps For Windows
New To Android? Welcome, Here"s A Brief Intro
[GAPPS][4.4.x] OFFICIAL Up-to-Date PA-GOOGLE… | Paranoid Android | XDA Forums
Today I Learned: 10 Amazing Facts For Geeks Discovered On Reddit [Weird & Wonder...
How To Learn Programming Without All The Stress
Apache OpenMeetings Project – Home
Cleaning up Visual Studio project folders using PowerShell - Ricky"s Bing Maps B...
Don’t be #FresherWeak, be a Smart Student with Smart Apps - Microsoft UK - Site ...
Videoconferencing - Open Source Ecology
telepresence - the open source SIP TelePresence system - Google Project Hosting
Poor man"s comments: Inserting text that has no effect into a configuration file...
How To Live Like A Fortune 500 Leader
5 Secrets Of The Steam Client That You Should Be Using
Project Hieroglyph
Innovation Starvation | World Policy Institute
The Spooky Nature of Electromagnetic Radiation
Incident Management System for IT Monitoring Tools | PagerDuty
BlueStacks
Andy the Android Emulator
VESA announces DisplayPort 1.3 standard -- enables 5K resolution
#09 Grant Fritchey, Database Dev Ops | no dogma podcast
4 DIY Geeky Drink Recipes To Get Your Buzz On
organic fertilizer: powershell: converting int64 datetime to something legible
More Fun Creating PowerShell Tools
Docker Part 2 – HOWTO Remove / Delete Docker Containers | tekhead.org
Deploying Log Insight with PowerCLI 5.8 R1 new features - Virtu-Al.Net
Successful Men Carry These 7 Things Around With Them — Do You?
10 Useful Items You Should Never Throw Out
SQL Server on vSphere Workshop at VMware - SQLRockstar - Thomas LaRock
How to use Twitter in a Linux terminal with Rainbow Stream - Linux FAQ
KeySmart - Premium Pocket Key Organizers & Key Holders - Made In The USA
Fun building a CCIE Security home Lab | . . TheSecurityBlogger . . .
Delete Old Files with File Management Tasks - DeployHappiness
Cyclades, Avocent Console Connection Guide
MS Office 2007/2010 Deployment failure - Unknown Error Code 30059 - Desktop Cent...
Simple Ready to Roll Linux Backup Script | IO Digital Sec
How to Prepare for Linux Sysadmin Certification | Linux.com
Miracast in Enterprise Environments - FAQ - The Deployment Guys - Site Home - Te...
Miracast in Enterprise Environments - The Deployment Guys - Site Home - TechNet ...
BattBorg: power your Raspberry Pi with almost any kind of battery | Raspberry Pi...
Securosis Blog | Secure Agile Development: Agile and Agile Trends
wissel.net :: Foundation of Software Development
SQL Server Configuration Check - SQLRockstar - Thomas LaRock
Performance Metrics for SQL Server 2014 - SQLRockstar - Thomas LaRock
SQL Server Troubleshooting Useful Links - SQLRockstar - Thomas LaRock
Optimize Text with PowerShell
Creating Your Own PowerShell Command
Friday Fun - A PowerShell Popup Alternative
Docker Part 1 – Introduction and HOWTO Install Docker on Ubuntu 14.04 LTS | tekh...
SQL Server Index and Statistics Maintenance
Disabling vs. Dropping Indexes - Brent Ozar Unlimited® by Brent Ozar Unlimited®
My Simple Trick for Quickly Making Secure Passwords | The Nubby Admin
alias secpass="openssl rand -base64 24" alias hexpass="openssl rand -hex 24"
Female bosses not averse to sexual harassment ‹ Japan Today: Japan News and Disc...
Modern OpenFlow and SDN - Part II | Big Switch Networks, Inc.
SQL Server Index Analysis Script for All Indexes on All Tables
HustleCon 2014 - I went, I spoke, but Sam made $40K from it | Neville"s Financia...
Video: Seated stretches for the workplace - Mayo Clinic
The 6 Companies With the Best Customer Service
6 Easy Tricks to Become Instantly More Likeable
How do I find running Traces in SQL Server? - Stack Overflow
SELECT * FROM sys.traces
IIS Server and Site Comparison with Web Deploy - Eric Parvin - Site Home - MSDN ...
Backup Strategies with Web Deploy - Eric Parvin - Site Home - MSDN Blogs
Scaled Agile Framework: Using TFS to support epics, release trains, and multiple...
How to use cccheck to prove no case is forgotten - Francesco"s Blog on CodeContr...
Jeff Hengesbach: Fix Disappearing Windows 7 Desktop Shortcuts
SharePoint Sysprep - Shared technical tips from Emmanuel Bergerat - Site Home - ...
New update for Remote Desktop on iOS available now! - Remote Desktop Services (T...
Part 1: Get Started with Python - Canadian Developer Connection - Site Home - MS...
Foliotek Development Blog » Blog Archive » SQL Server Optimization Script with I...
-- This query identifies indexes on a database that need to be rebuilt. -- -- The recommendation is to rebuilt queries whose fragmentation exceeds 30.0% -- and who page count exceeds 50 pages. These parameters may be adjusted below. DECLARE @page_count_minimum smallint DECLARE @fragmentation_minimum float SET @page_count_minimum = 50 SET @fragmentation_minimum = 30 SELECT sys.objects.name AS Table_Name, sys.indexes.name AS Index_Name, avg_fragmentation_in_percent AS frag, page_count AS page_count, sys.dm_db_index_physical_stats.object_id AS objectid, sys.dm_db_index_physical_stats.index_id AS indexid, partition_number AS partitionnum FROM sys.dm_db_index_physical_stats (DB_ID(), NULL, NULL , NULL, "LIMITED") inner join sys.objects on sys.objects.object_id = sys.dm_db_index_physical_stats.object_id inner join sys.indexes on sys.indexes.index_id = sys.dm_db_index_physical_stats.index_id and sys.indexes.object_id = sys.dm_db_index_physical_stats.obje
HOW TO: Find Currently Running Long SQL Agent Jobs - SQLRockstar - Thomas LaRock
Fix Windows 7 Desktop Shortcuts Disappearing - gHacks Tech News
HDD Guardian
Check if on the health of your harddrives
Upgrading to SQL Server 2014: A Dozen Things to Check - SQLRockstar - Thomas LaR...
SQL Server Backup, Integrity Check, Index and Statistics Maintenance
Bolse 7-Port USB Charger Review and Giveaway
Beginner"s Guide To Setting Up SSH On Linux And Testing Your Setup
_
PowerShell Prank #1: R2D2 - DeployHappiness
F5 debugging fails for any SharePoint project types using Visual Studio Professi...
Bizlink, creating new doc types for tracking metadata | Michael Ellerbeck
The Fundamental Advantages Of Using A Chromebook
Make These 4 Changes Before You Delete Any Online Account
You Can Upgrade MS-DOS 6.22 To Windows 8, If You Really Want To [Stuff to Watch]
How To Be A Google Power User
Rebuild or Reorganize: Configure SQL Server Index Maintenance by Brent Ozar Unli...
PowerShell v5 Preview is Out. Here are my two favorite features - Todd Klindt"s ...
Securosis Blog | Secure Agile Development: New Series
File systems, Data Loss and ZFS - ClusterHQ
The State of ZFS on Linux - ClusterHQ
It"s time for business-led IT to come out of the shadows
Why is U2’s latest album on your iPhone? How to remove Apple’s publicity stunt —...
Best Excel Tutorial - Best Excel tutorial in whole Internet
Shell Runner - MOBZystems
Happy 15th Birthday, Wi-Fi! Thanks for letting us surf the web on the toilet
Using vscsiStats to better visualize storage I/O | vmPete.com
Netrunner - The Best Distro You"ve Barely Heard Of - Yet Another Linux Blog
Solarized - Ethan Schoonover
@JKevinParker: Managing SharePoint User Access
Debian PVHVM vs PV
Xen & Docker: Made for Each Other! | Linux.com
Convivea - Home of Bit Che - Torrent Search
SmoothVideo Project (SVP) - motion estimated frame interpolation with any video ...
Limerence | Sparkwood Records
Colourful ! systemd vs sysVinit Linux Cheatsheet
Seth"s Blog: Different kinds of broken systems
Battery Technologies That Are Going to Change the World
Getting Ready…Troubleshooting unattended windows installation — matt wrock"s sof...
ScratchJr - Home
Face Recognition: How It Works and Who"s Watching?
Less Than Dot - Blog - How to get information about all databases without a loop
10 High-Value Activities in the Enterprise - J.D. Meier"s Blog - Site Home - MSD...
gfxmonk/shellshape · GitHub
10 Easy Back Exercises That Will Help Eliminate Pain
Gutter Guard information from Consumer Reports
But you"ll pay less than $100 if you install the CR Best Buy Amerimax 85198 or 854054 yourself. You"ll still save thousands even if you add in the roughly $100 to $500 a contractor will charge to put in a do-it-yourself system.
Intro to Git and GitHub Part 4: Merging and Rebasing overview - Tobiah Marks
Intro to Git and GitHub Part 3: Branching - Tobiah Marks
Intro to Git and GitHub Part 2: Publishing, cloning, and forking. - Tobiah Marks
Intro to Git and GitHub Part 1: Your first repository - Tobiah Marks
Intro to Git and GitHub - Tobiah Marks
Find unused indexes using sys.dm_db_index_usage_stats | Basit"s SQL Server Tips
An Obsessively Thorough Battery (and more!) Showdown
CoreOS is Linux for Massive Server Deployments
CoreOS Brings Docker Container Tech to DigitalOcean
George Orwell, "Politics and the English Language," 1946
Foliotek Development Blog » Blog Archive » SQL Server Database Optimization – a ...
Discovering Unused Indexes tutorial and example
tsql - List of all index & index columns in SQL Server DB - Stack Overflow
List Indexes For Database using TSQL
The Ultimate Cheat Sheet To Becoming A Great Public Speaker
Revisiting FTP Basics - WebTopics - Site Home - MSDN Blogs
How to install a Service Pack at a SQL Server 2012 Failover Instance - Best Prac...
10 Big Ideas from The 7 Habits of Highly Effective People : Sources of Insight
skills
Disabling Lenovo Track Pad Edge Swipe - mschray - Site Home - MSDN Blogs
VS & TFS 2013 Update 4 CTP 1 is available - Brian Harry"s blog - Site Home - MSD...
Updating The SharePoint 2010 CSV Bulk Taxonomy TermSet Importer/Exporter For Sha...
Foliotek Development Blog » Blog Archive » Identifying Unused Indexes in a SQL S...
Friday Fun: Creating PowerShell Scripts with PowerShell
The evolution of the computer -- from 1613 to 2013
vmware/webcommander · GitHub
How to Share a Terminal Session with Friends - Make Tech Easier
byobu
7 Fresh Veggies You Can Grow From Kitchen Scraps
Tox: A New Kind of Instant Messaging
Windows Installer celebrates its 15th birthday
Free online cybersecurity courses | SANS Cyber Aces
Troubleshooting Slow Startup or Login Times Caused by Group Policy - DeployHappi...
Roundup of Software Defined Radios - rtl-sdr.com
rtl-sdr and GNU Radio w/Realtek RTL2832U, E4000 and R820T
Symbols and Emoji - Murray Sargent: Math in Office - Site Home - MSDN Blogs
SecurityLaxity: Cheap Entropy: Using your RTL-SDR as a hardware entropy source
Friday Fun Text to HTML
Tracking Your Day with PowerShell
CyanogenMod
Enable SharePoint 2013 Integrated SSRS To Send Email Alerts | Richard Skinner
Tri-Monitor Wood Mount - Imgur
Homemade Monitor Stand - Imgur
2014 Ultimount - Imgur
Sinkholing the Backoff POS Trojan - Securelist
After 13 years…Why do End Users Still Struggle with SharePoint? | Asif"s SharePo...
lab11.eecs.umich.edu/content/pubs/ghena14green_lights.pdf
Soon you’ll be able to use a Chromebook as an Android ADB server for phone mods ...
Teaching Engineering As A Social Science | Kitchen Soap
DSC... What is it for, really? — Steven Murawski
How-to recover from checksum mismatch errors in SVN · andrew.hedges.name
KDDI to build new TELEHOUSE data centers in Tokyo and Osaka ‹ Japan Today: Japan...
Build a $35 Time Capsule - Raspberry Pi Time Machine Backup Server - Raymii.org
Viewing the History of an Active Directory Object with Replication Metadata
Date and Time Math with PowerShell
Active Directory SPN Mappings and Kerberos
Managing Local Backups with Windows Server Backup
Getting Started with a Lotus Notes to Exchange Mail Migration
Script to Collect Hardware Inventory Data
Ping a List of Servers with PowerShell
Netflix/Scumblr · GitHub
Netflix/Workflowable · GitHub
Netflix/sketchy · GitHub
level: An Ultrawide-band Radio Module • Hackaday Projects
VMware KB: Increasing the size of a Linux ext3 virtual machine disk
Cluetrain at Fifteen | Linux Journal
gvb [Wikiston]
EasyNAS | making storage easy
How to Increase the size of a Linux LVM by expanding the virtual machine disk | ...
VMware KB: Extending a logical volume in a virtual machine running Red Hat or Ce...
/dev/
What’s better than sushi? Ramen sushi ‹ Japan Today: Japan News and Discussion
SharePoint Server Patch Mismatch Problems - Build on SharePoint - Site Home - MS...
Typical Programmer - How I work as a digital nomad
Twilio
Linux: Install Ansible Configuration Management And IT Automation Tool
Configure Network Bonding in Ubuntu Server
Viber for Linux PC | Viber Desktop
How to configure a network printer and scanner on Ubuntu desktop - Linux FAQ
Compatible web browsers and PDFMaker applications
Why Didn’t Technology Create a 4-Hour Workday? — My Money Blog
Downloading Dell Driver CAB files automagically with the Driver Pack Catalog | d...
Dell Driver Pack Catalog | Keith"s Consulting Blog
Twilio Cloud Communications - APIs for Voice, VoIP and Text Messaging
Karma Platform - The New Approach for Agile Business Management
Release Management tools to deploy an app
Improving Linux HiDPI Support For Gnome, KDE, XFce, Cinnamon And Firefox
GSM Vs. CDMA: What Is The Difference And Which Is Better?
The 8 Biggest Security Breaches In History
GPS III: Where Are We? And Where Are We Going?
Researchers propose new Android security framework that could aid BYOD schemes —...
Temporary directory for a shell script
Making sense of the cloud: SaaS, PaaS and IaaS explained
data
KaOS | A lean KDE Distribution
Linux distro KaOS 2014.08 is here with KDE 4.14.0
Is legacy IT paralyzing your organization?
All About Test Planning (Part 1–Introduction) - Testing The Testing Strategy - S...
25 Words Every Scrabble Player Must Memorize
Different methods to Lock or unlock SAP users « SAP Basis Cafe
SU10 mass lock/unlock
Who Was Frank Sprague? - Business Opportunities Weblog
Frank Sprague
SharePoint 2010 Build Numbers - Todd Klindt"s SharePoint Admin Blog
Internet Touches Half Million Routes: Outages Possible Next Week - Renesys
Internet, that’s called “cold comfort.”
Creating a Company Where Everyone Gives Their Best - J.D. Meier"s Blog - Site Ho...
organic fertilizer: dns resolver behavior
Get done on time... really. | [The Integration Engineer]
More Flashing Fun
Use Free 7 Minute Workout Videos To Get Into Shape [Stuff to Watch]
SharePoint patching demystified - Stefan Goßner - Site Home - TechNet Blogs
SharePoint E-Mail Confirmations and Alerts (under the hood) - IanR - Site Home -...
Usage of EDI specifications | [The Integration Engineer]
EDI Standards and Usage Specification | [The Integration Engineer]
Document Manager Home
What caused today’s Internet hiccup | BGPmon
Complex Topology and Wiring Validation in Data Centers
The 6 Things You Need to Know to be Great in Business | blog maverick
How Employees Lost Empathy for their Work, for the Customer, and for the Final P...
etsy/nagios-herald · GitHub
Restore TFS backups from SQL Enterprise to SQL Express
Installing TFS 2012 on Server 2012 with SQL 2012
Upgrading TFS 2013 to TFS 2013 Update 2 (2013.2) « Software Development and Infr...
Backing up and Restoring your TFS Server - Brian Harry"s blog - Site Home - MSDN...
Train SharePoint Users within SharePoint sites | Asif"s SharePoint Blog
SharePoint 2013 Build Numbers - Todd Klindt"s SharePoint Admin Blog
(get-spfarm).buildversion
Set Permission to List Items using PowerShell | SharePoint Rider
4 Steps to a culture of performance - O"Reilly Radar
zero-project - Official website
Rename TFS database
Get Rid of Orphaned Content Types in SharePoint 2013 | Ingo Karstein"s Blog
VMware KB: Backing up a Windows Server 2008 R2 or Windows Server 2012 virtual ma...
Big List of Free Consumer Reports (2/2): See Your Confidential Housing, Insuranc...
Big List of Free Consumer Reports (1/2): See Your Confidential Credit, Banking, ...
Troubleshooting WMI Series coming - Ask the Performance Team - Site Home - TechN...
How To Automate Changing The Local Administrator Password - Ask Premier Field En...
Script Deletes Orphaned Printer Ports | sepago
Security baselines for Windows 8.1, Windows Server 2012 R2 and Internet Explorer...
RSSOwl - Powerful RSS / RDF / Atom News Feed Reader with Google Reader Synchroni...
Post Job to 50 Job Boards with One Submission | ZipRecruiter
TFS Upgrade Guide - Downloads
ocropus - The OCRopus(tm) open source document analysis and OCR system - Google ...
tesseract-ocr - An OCR Engine that was developed at HP Labs between 1985 and 199...
Installing TFS 2013 on Windows Server 2012 R2 with SQL Server 2014 CTP1 | Alexan...
Ping A List Of Computers and Double Check DNS name against NetBios name | chenti...
Check Hard drive for bad sectors or bad blocks in linux
wissel.net :: Time stamped encrypted archives
Developers use Version Control, business users Document management and consultants ZIP files.
Downloads - triage-ir - Triage: Incident Response - Scripted collection of syste...
MSDN and TFS Licensing Gotchas
Understand TFS Licensing - Visual Studio & TFS for US Public Sector - Site Home ...
TFS Upgrade Guide - Home
25 Years Of Glorious Internet
How to set up a USB network printer and scanner server on Debian - Linux FAQ
core
How to remove file metadata on Linux - Linux FAQ
dataglass
SQL Server Merge Statement – Insert/Modify/Delete Records | SharePoint Rider
I Hate Write-Host So Much… - Lessons Learned - Site Home - MSDN Blogs
Compatibility with SQL Server 2014 - Microsoft Dynamics NAV Team Blog - Site Hom...
Episode #44 Data Driven Performance | PerfBytes
organic fertilizer: troubleshooting wmi…
The Gutenberg Clock | ch00ftech Industries
Payment Card Industry PCI Security Best Practices | . . TheSecurityBlogger . . .
That grumpy BSD guy: Password Gropers Take the Spamtrap Bait
Removing a user"s site collection administrator privileges and security group me...
More tokenizing... - The Activity Designer - Site Home - MSDN Blogs
URL Length Limits - IEInternals - Site Home - MSDN Blogs
VSS backup of AlwaysOn Secondaries - CSS SQL Server Engineers - Site Home - MSDN...
11 Shortcuts For Learning Linux In Record Time
Run Through This Checklist Before Calling IT Support
sysMATT - Matthew E Hoskins: Backup, Restore, Customize and Clone your Raspberry...
Exciting New Terminal Emulators - Linux Links - The Linux Portal Site
Best Time to Buy a Car | POPSUGAR Smart Living
The Science of Strengthening Glass
How To Make Free PDF Forms With LibreOffice Draw
How To Control Your Android Using Your Computer’s Mouse And Keyboard
Why Dell’s PowerEdge VRTX is Ideal for Virtualization | Blades Made Simple
6 Android Apps Every Raspberry Pi Owner Should Use
Enabling BizTalk Services to work with Service Bus 2.2 SDK - BizTalk Team Blog -...
A Homemade Bubble Robot for the Kids
Cool Tools – rTracker
Real World Computing: Using your Operating System Login for IBM Notes can "Poiso...
Dual-Stack Monitoring | Jens" BLOG
VRT Network Equipment | VRT Systems
Raspberry Pi add-on board controls entire buildings ·  LinuxGizmos.com
The .Default user is not the default user - The Old New Thing - Site Home - MSDN...
How to Image and Clone Hard Drives with Clonezilla | Linux.com
Yahoo CISO Details Challenge of Security at Scale - eSecurity Planet
Zipping a single file with PowerShell - Jerry Dixon"s Blog - Site Home - MSDN Bl...
Press PowerShell Pause to Continue
milek"s blog: Monitoring Dropped UDP packets
How to set up a Samba file server to use with Windows clients - Linux FAQ
DailyTech - China Kicks Symantec, Kaspersky Off Approved Software List
Windows
New To Android? Part Two: Master Using Your Phone
What is Docker and why is it so darn popular? | ZDNet
The Principles of Modern Management - J.D. Meier"s Blog - Site Home - MSDN Blogs
Stay up-to-date with Internet Explorer - IEBlog - Site Home - MSDN Blogs
Application Compatibility in the .NET Framework
PowerShell Script to Limit SharePoint Site Templates Available
PowerShell Script To Determine If SharePoint List Uses InfoPath Forms
Roll Your Own YouTube/Flickr with MediaGoblin | Linux Journal
Linux/Unix Echo Command with Practical Examples
Paperclip Lock Picking Sets
Reverse Engineering a NAND Flash Device Management Algorithm
A Dot Notation Nation - User Ed - The blog of Ed Price, Customer Program Manager...
18 Unexpected Lifehacking Tips To Improve Your Exam Scores
$149 networking security gizmo runs Snort on OpenWRT ·  LinuxGizmos.com
tpp - the command line presentation tool
Planning Failover Cluster Node Sizing - Clustering and High-Availability - Site ...
Search Reporting and SharePoint 2013: Introduction - Nathan"s Search Blog - Site...
Monitoring Active Directory Import for SharePoint 2013 User Profiles - Better To...
What matters the most in IT strategy? Business Value or Business Impact? - The A...
The Barry Shein Home Page
Converting Times from One Time Zone to Another Time Zone in PowerShell - System ...
eBook deal of the week: Code - Microsoft Press - Site Home - MSDN Blogs
The Physical Internet - Grant Holliday"s Blog - Site Home - MSDN Blogs
Practice and Theory of Security Reviews -- Part 3 - Eugene Bobukh"s WebLog - Sit...
Security Reviews: The Heuristics Zoo, Part 1/2 - Eugene Bobukh"s WebLog - Site H...
Practice and Theory of Security Reviews - Eugene Bobukh"s WebLog - Site Home - M...
RHEL 7 / CentOS 7 : Disable Firewalld and use iptables @ All Linux User"s Blog
InfoSec Handlers Diary Blog - A Honeypot for home: Raspberry Pi
What are better alternatives to basic command line utilities - Linux FAQ
DTVD/rainbowstream · GitHub
Setup Flexible Disk Storage with Logical Volume Management (LVM) in Linux - PART...
Cheat - An Ultimate Command Line "Cheat-Sheet" for Linux Beginners and Administr...
More GDB tips and tricks
The making of the Raspberry Pi Model B | Raspberry Pi Today
Financial Literacy Cartoon for Kids Starring Warren Buffett — My Money Blog
Turn a Raspberry Pi into your own personal cloud
Removing Old Active Directory Users with PowerShell
How to troubleshoot and fix common issues with your iPhone and iPad — Tech News ...
Honeybee Hive Monitoring • Hackaday Projects
Handling ini files in PowerShell
Tonido | Run your own Personal Cloud
Hotel WiFi Speed Test by SpeedSpot - Find Fast Hotel WiFi
Hotel WiFi Speed Test
How to overcome the main challenges faced by IT departments
No BYOD policy? Now is the time to prioritize user-oriented IT
Endpoint management is very much alive
5 Important Lessons You Could Learn From Recent Data Breaches
How To Speak Gen Z
Flowchart: Can You Use That Copyrighted Picture?
Energetic Bear: more like a Crouching Yeti - Securelist
Energetic Bear/Yeti
Performing a SharePoint site collection backup and restore from an unattached da...
Too many single use plans, now what? - Blog do Ezequiel - Site Home - MSDN Blogs
after
Motivational Quotes : Sources of Insight
Getting Ready for Chef PowerShell DSC | Chef Blog
Reduce AppFabric Calls to Active Directory for SharePoint Farms - Build on Share...
DIY NAS: 2014 Edition - Brian"s Blog
Why I Chose Non-ECC RAM for my FreeNAS - Brian"s Blog
same
Increase the number of workstations a user can join to a domain - TechRepublic
ms-DS-MachineAccountQuota
OpenELEC Mediacenter - Home
Minimal Linux Live
Enterprise Support - Symantec Corp. - How to manually uninstall Symantec Endpoin...
How to Eat Well on Just $20 a Week (With Meal Plans!)
Logging in CMTrace format from PowerShell - System Center Blog by Russ Slaten - ...
Reverse Engineering Logitech Unifying USB Protocol | Tequals0
UPower
o
Logitech Unifying devices support in UPower | Julien Danjou
Grocery Shopping 101 - Home - Yoga Eat Run
25 Frugal Items for Your Organic Vegan Grocery List
One Windows Tool To Get Instant Access To All Your Hardware Controls
Windows key + X.
Tapuino, the $20 C64 Tape Emulator • Hackaday Projects
recording
15 CMD Commands Every Windows User Should Know
Why cant PS run loop fast ? - anantd"s blog - Site Home - MSDN Blogs
Catan
Building a better Internet, one Tor relay at a time | Parabing
milek"s blog: Massive msync() speed up on ZFS
BitKey: A secure, Debian-based Live OS for bitcoin transactions | LinuxBSDos.com
Cybersecurity & Cyber Defense | Dump Windows Event Logs To CSV Text Files (VBScr...
SolderSmoke Daily News: Moxon
Open Source Wireless Garden Kits: Cooking Hacks Open Garden- Postscapes
Download Original Iphone iOS Firmwares | Tech ArrivalTech Arrival
Don"t Fly Drones Here
barnowl
I have been fighting spam for 10 years - Terry Zink"s Cyber Security Blog - Site...
How to protect your company data without inspecting SSL
What events and columns are analyzed by SQL Server Upgrade Advisor from a SQL Tr...
SharePoint 2013 Incoming E-Mail Feature Troubles Configuring SMTP Services - Ian...
Sitespeed.io - Analyze your website speed and performance
Best Practices and Troubleshooting for Group Update Providers | Symantec Connect
Securosis Blog | TI IR/M: The New Incident (Response) & Management Process Model
IBM The Repair Calendar feature in Notes 8.5 - United States
Best IBM article I have ever read!
Update a registry key for ALL users on a system | Mick"s Mix
_
ONION PI - REV BR - Area31 Hackerspace
Linux / Unix logtop: Realtime Log Line Rate Analyser
Viktor"s DIY: How to Recover a Laptop After a Failed BIOS Update
Sorting a hashtable by byte value in PowerShell
How to manage DigitalOcean VPS droplets from the command line on Linux - Linux F...
20 things to do after installing Elementary OS 0.2 Luna
EFF releases experimental open wireless router firmware | LinuxBSDos.com
Programming is not math, huh?
Creating a second large partition on a single drive machine | Keith"s Consulting...
Computer Science Unplugged |
Application Request Routing and URL Rewrite – PART 1(Server Farms) - Chiranth"s ...
How to replace the broken screen of your acer Iconia a 200 | quaint
Electronic discovery is a challenge. BYOD is a possible solution — Tech News and...
The History of Programming: Part 1
Configuring SharePoint 2013 ECT & BCS for SQL Connectivity - IanR - Site Home - ...
Downloads | Raspberry Pi
Raspberry Pi 3D full-body scanner interview | Linux User & Developer - the Linux...
How to setup your most used templates in PowerShell_ISE - Ashour"s blog - Site H...
Improve Your Social Skills With Highlights From 5 Great TED Talks
[object Object]
MAP/XSLT Performance Comparison between BizTalk Server 2013(R2) vs. 2010 - BizTa...
Get Actual CPU Clock Speed with PowerShell - Remko Weijnen"s Blog (Remko"s Blog)
Chef and DSC - Wanna Try It? — Steven Murawski
Just Culture resources « Code as Craft
Just Culture | Sidney Dekker
How to Patch a Single SharePoint Farm With Minimal any Downtime - Build on Share...
Tempus Nova and Denny"s Inc. Partner to Take Denny"s to Google Apps - Press Rele...
Adminer - Why is better than phpMyAdmin?
PowerShell DSC Resource Kit Wave 5 Arrives - Windows PowerShell Blog - Site Home...
Friday Fun Reverse PowerShell
Migrating IIS 6.0 Web Application to New Version Guidance - Michael Li - Site Ho...
Pimp your Prompt
Stupid Adobe Reader XI, setting printer dialog Actual size | Michael Ellerbeck
“iprintScaling”=dword:00000001
The 2014 Guide To Windows 7 For Ex Windows XP Users
Why Smartphone Breaks At Work Aren"t Such A Bad Idea : NPR
Seth"s Blog: Project management for work that matters
Active Directory Security, Permission and ACL Analysis | System Admins
Is the Chef Learning Curve Worth It? — Steven Murawski
DNS inventor Paul Mockapetris to startups: "Complexity is your enemy" | VentureB...
Read this if you have transactional replication configured and plan to upgrade f...
Do you want SharePoint 2013 in-flight workflows to complete after a Full Farm Fa...
Four Active Directory PowerShell Scripts and Notes - DeployHappiness
Mallory: Transparent TCP and UDP Proxy – Intrepidus Group - Insight
In Pictures: The spectacle of the "Supermoon"
US government says online storage isn"t protected by the Fourth Amendment
Documenting Your Task Sequences Automagically - The Deployment Guys - Site Home ...
NETvNext Blog
Beginner"s Guide to WordPress Database Management with phpMyAdmin
InfoSec Handlers Diary Blog - Egress Filtering? What - do we have a bird problem...
InfoSec Handlers Diary Blog - Finding the Clowns on the Syslog Carousel
Why Python Makes A Great First Programming Language - ReadWrite
TutorialsTaskForce - GNU Radio - gnuradio.org
Pi MusicBox - A Spotify, SoundCloud, Google Music player for the Raspberry Pi, w...
Super moon ‹ Japan Today: Japan News and Discussion
XBOOT
Net-SNMP installation and configuration
How to use systemd for system administration on Debian - Linux FAQ
Twin rainbows ‹ Japan Today: Japan News and Discussion
Home | Sakai
VMware Snapshot Size Powershell Nagios Script | Nerhood Weblog
Friday Fun: A Random PowerShell Console
ShellSend: Email Files From the Command Line! • Binary Fortress Software
5 Windows 7 Features You Didn"t Know Existed
Microsoft SQL Server 2008 R2 Utility Control Point – Multi Server Management - s...
One-Liner: Symlinks and Windows - Lessons Learned - Site Home - MSDN Blogs
Fix up the databases after restoring Tfs 2008 to the Tfs 2010/2012 Data Tier - V...
Linux Basics: How To Find Size of Directory Commands | Unixmen
Recommendations for Page Files on SharePoint Servers - Share Poignant - Site Hom...
InfoSec Handlers Diary Blog - Who inherits your IP address?
wissel.net :: The folly of root cause analysis
How to set up two-factor authentication for SSH login on Linux - Linux FAQ
Securosis Blog | Open Source Development and Application Security Survey Analysi...
Getting SRV Records with PowerShell - Lessons Learned - Site Home - MSDN Blogs
Understanding the Windows ADK for Windows 8.1 Update and MDT 2013 - Microsoft De...
_
mathse/my-check_mk-checks · GitHub
[ROM][A200] OmniROM KitKat 4.4.2
ADK not being detected by MDT | HomeOps Tech Titbits
IOBlazer – VMware Labs
vBenchmark – VMware Labs
OmniROM
mRemoteNG
Tekzilla
rsnapshot
keep
Sorting and Pagination in ASP.NET 4.5 - Premier Field Engineering Developer Blog...
Configuring TFS with the databases spread across different SQL server instances ...
SQLAlchemy - The Database Toolkit for Python
Manage Linux Containers with Docker on Ubuntu | HowtoForge - Linux Howtos and Tu...
LXC 1.0: Troubleshooting and debugging [10/10] | Stéphane Graber"s website
LXC 1.0: GUI in containers [9/10] | Stéphane Graber"s website
LXC 1.0: Scripting with the API [8/10] | Stéphane Graber"s website
LXC 1.0: Unprivileged containers [7/10] | Stéphane Graber"s website
LXC 1.0: Security features [6/10] | Stéphane Graber"s website
LXC 1.0: Container storage [5/10] | Stéphane Graber"s website
LXC 1.0: Some more advanced container usage [4/10] | Stéphane Graber"s website
LXC 1.0: Advanced container usage [3/10] | Stéphane Graber"s website
LXC 1.0: Your second container [2/10] | Stéphane Graber"s website
LXC 1.0: Your first Ubuntu container [1/10] | Stéphane Graber"s website
So you need to write a PowerShell script
Microsoft SharePoint Foundation Subscription | System Admins
LucD notes - My PowerShell ramblings
Homepage
LXC 1.0: Blog post series [0/10] | Stéphane Graber"s website
napp-it // webbased ZFS NAS/SAN appliance for OmniOS, OpenIndiana, Solaris and L...
ASP.NET Session State using SQL Server In-Memory - Ken Kilty"s Blog - Site Home ...
MSSQL Server Error Logs - Lessons Learned - Site Home - MSDN Blogs
Release Management - Getting Started Links - Michael Pedersen"s Blog - Site Home...
SharePoint 2013 Certificate Error Causes Performance Issues | Richard Skinner
OpenBuilds Open Source Embroidery machine | Dangerous Prototypes
World Domination Summit
Observations with the Active Memory metric in vSphere | vmPete.com
Get OpenVPN up and running, enjoy your privacy | Parabing
OpenBTS open-source project
Norse - IPViking Live
SQL Database Reports with PowerShell
BizTalk Server 2013 R2 - Generally Available Now! - BizTalk Team Blog - Site Hom...
Update for SharePoint Online Solution Pack for branding and provisioning - Vesa ...
SharePoint 2013 - How much memory is recommended by Microsoft? - George Bethanis...
Seeing colors with psake - Heath Stewart"s blog - Site Home - MSDN Blogs
Adding shortcuts on desktop using Group Policy Preferences in Windows 8 and Wind...
OpenDaylight | A Linux Foundation Collaborative Project
group policy - How to set the Internet Explorer Home Page via GPO? - Server Faul...
Nartac Software - IIS Crypto
hypercat - 1248 Wiki
Group Policy Central - Your central place online for IT Administrators with many...
SunSpider 1.0.2 JavaScript Benchmark
Which VS / TFS Power Tools should I use? - SoftwareSimian - Site Home - MSDN Blo...
Collecting TFS Best Practice Analyser Logs - SoftwareSimian - Site Home - MSDN B...
PowerShell Workflows: Restarting the Computer - Hey, Scripting Guy! Blog - Site ...
Wordfence Security Plugin for Wordpress | The Many Faces of Mike McBride
Wordfence
Overview of BizTalk Health Monitor (BHM) - BizTalkHealthMonitor - Site Home - MS...
Download Script Browser & Script Analyzer 1.3 from Official Microsoft Download C...
Nerd Vittles » The Definitive VoIP Quickstart Guide: Incredible PBX for the Rasp...
LVM Snapshot : Backup & restore LVM Partition in linux
NETGEAR goes hardcore -- announces Nighthawk X6 AC3200 Tri-Band WiFi Router
Ceph Turns 10: A Look Back — Red Hat Open Source Community
More PowerShell Laziness
Open Wireless Movement
Sigsense Technologies
Calendar Reporting with Excel and Power Pivot - Analysis Services and PowerPivot...
Nest Learning Thermostat has its security cracked open by GTVHacker
Copy-ItemWithProgress | Keith"s Consulting Blog
PowerShell for the Lazy IT Pro
SharePoint 2013: Unable to Start the User Profile Synchronization Service - ianr...
Why IT departments will soon be the exception, not the rule
The new way to configure Internet Explorer proxy settings with Group Policy | Th...
Creating the Group Policy Central Store - Updated for Windows 8.1/2012R2 - Deplo...
libreCMC · The libre embedded GNU/Linux distro
About ThinkPenguin.com | ThinkPenguin.com
oVirt
Virtual Machine Manager Home
Windows 7 Virtualization with KVM - Funtoo
eduroam
check freeradius/radius auth/acct/status advanced and fully featured - Nagios Ex...
www.theseus.fi/bitstream/handle/10024/47101/Urpi_Joonas.pdf
Deploying RADIUS: Configuring Authentication with Active Directory
Configuring FreeRADIUS for Authentication against ActiveDirectory | eduroam-US
The Big Byte: How to setup FreeRADIUS to integrate with Active Directory Authent...
guide/FreeRADIUS Active Directory Integration HOWTO
guide/FAQ
S5: A Simple Standards-Based Slide Show System
100% Cable Patching in the Closet?
Tapestry Workshops
Ansible is Simple IT Automation
Consumerism Commentary
Visual Multiplication with Lines -- Math Fun Facts
ManageIQ
Script Different settings per task sequence (MDT 2012)
reptyr: Attach a running process to a new terminal - Made of Bugs
Artistic Style - Index
Indent - GNU Project - Free Software Foundation
Irssi - The client of the future
Git - git-bisect Documentation
Using Expect Scripts to Automate Tasks » ADMIN Magazine
bartaz/impress.js · GitHub
Hacker Public Radio ~ The Technology Community Podcast Network
byobu.co
wxWidgets: Cross-Platform GUI Library
Installing SharePoint 2013 SP1 with SQL Server 2014 on Windows Server 2012 R2 - ...
SharePoint Feature Administration and Clean Up Tool - Home
Question of the year: what to do with Lotus Quickr | Lotus, er, IBMRockStar
Elevator pitch
Reduce CPU core count to improve Lucene.NET index building performance - Michael...
@JKevinParker: Types of Sites and Site Collections in SharePoint 2013
The Hidden Treasures of IPtables
Debian TARPIT iptables How To
Redis
mhn
Weekly MySQL News
Zillabyte
The parable of the beer and diapers • The Register
gerrit - Gerrit Code Review - Google Project Hosting
ImperialViolet - BoringSSL
Betty: Turn Generic English Into Linux Terminal Commands
MoviePy — MoviePy 0.2 documentation
Videogrep: Automatic Supercuts with Python – Sam Lavigne
InfoSec Handlers Diary Blog - New tool: kippo-log2db.pl
kippo - SSH Honeypot - Google Project Hosting
Ninite - Install or Update Multiple Apps at Once
Easy Transcript
Giovanni Idili of OpenWorm: Brains, Worms, and Artificial Intelligence
Wireless | GlobalVision
This Is Why You Can"t Postpone Planning for Your Retirement (And How to Start)
How Do I Stop Screen From Wuff Wuffing at me? | The Nubby Admin
MobileWill: Live Raspberry Pi Power Usage!
Two Factor Auth List
Source Code Hosting Service Code Spaces Deleted By Hacker - Darknet - The Darksi...
SharePoint Integrated SSRS Reports Fail To Run After An Upgrade To Claims Authen...
What to do with Timer jobs in SP2013 - anantd"s blog - Site Home - MSDN Blogs
Heartbleed: Really that bad?
PerformanceTesting – OpenVPN Community
systemd
PID EINS!
OSSIM: Open Source SIEM & Open Threat Exchange Projects
Named: Endpoint Threat Detection & Response
Endpoint Threat Detection Response
OpenRC - Wikipedia, the free encyclopedia
Demystifying Systemd | dastergon"s weblog
Keybase
SlackBuilds.org
Master DNS servers: Stealth (a.k.a. Split or DMZ) DNS Server
Super Scratch Programming Adventure! (Covers Version 2) | No Starch Press
DNS Spoof Tutorial @ Calomel.org
https://w2.eff.org/Privacy/Key_escrow/Clipper/mykotronx.notes
Pocket Survival Guide - EMC Celerra
Improve your negotiation skills with BATNA
Best Alternative To a Negotiated Agreement.
Viewing GPO"s on the Commandline
Fastest way to switch mouse to left handed - I know the answer (it"s 42) - Site ...
rundll32.exe user32.dll,SwapMouseButton
In The Next Version - For SAP Customers The Future of Work Is Collaborative
stealth.openwall.net/xSports/shocker.c
Citrix ShareFile: Send Large Files - Secure File Transfer and Sharing
Service Principal Names for SQL Server - SQL Canada (@SQLCAN) - Site Home - MSDN...
Service Principal Names
Natively Compiled Procedures and Bad Execution Plans - Home Of The Scary DBA
Enterprise-caliber cloud BI | Birst
Clarity Media Group
Don’t get too used to 4G, 5G is on the way
Index maintenance script - Mohamed Sharaf"s Blog - Site Home - MSDN Blogs
Sing Out Loud Traditional Songs | American English
Homeowners: Could this save you thousands in just a few hours?
Circle City Con Indy"s First Hackercon
Jeremiah Grossman: Introducing AntiSamy
versions
childrensdyslexiacenters.org/Portals/30/Fundraising/Golf Outing/Golf Outing Plan...
Category:OWASP AntiSamy Project - OWASP
.
CMMS Software, Asset Management, EAM | Maintenance Assistant
How to check if you are editing GPO"s using a local, or central store - monkeydu...
JBroFuzz - OWASP
Burp Suite
Managing drivers in MDT 2012 using Driver Groups | Musings of an IT Pro
Advanced Persistent Threat (APT) Attack & Zero-Day Protection | FireEye Malware ...
Imperva - Data Center Security Solutions
How to Create and Edit Group Policy for Vista/Windows 7 PC"s - monkeydust.net
windows 7 group policy computer maintenance - Spiceworks
Citation management tool for open science | Opensource.com
Zotero
Death of the TIFF Image – Part Two | Xact Data Discovery
Death of the TIFF Image? | Xact Data Discovery
AnandTech | Advatronix Cirrus 1200: a Storage Server Under Your Desk
Advatronix Cirrus 1200
8 Things My Toddler Has Taught Me About Money
How to Backup Samba Domain Controller Configuration in Linux
Windows Server 2003 ‘End of Support’ Infrastructure Videos - Official Microsoft ...
From the MVPs: Updated Column Store Indexes in SQL Server 2014 - Microsoft Press...
jakubroztocil/httpie · GitHub
sanity/quickdt · GitHub
Scraping Sysinternals
Microsoft Deployment Toolkit (MDT) Wizard Studio - Home
MDT custom variable for Lenovo Model – DriverGroup | Siva Mulpuru"s Blog
LenovoModel
Querying the MDT database using a custom model - Michael Niehaus" Windows and Of...
CustomModel=#Left("%Model%", 4)#
The Millennials: A Generation Of Savers?
Coming back online | ServeTheHome and ServeThe.Biz Forums
dig.csail.mit.edu/2014/Papers/PST-PETS/PETS.pdf
Bits from Debian - Introducing the Debian Continuous Integration project
How to Build a Raspberry Pi Radio Transmitter
Guest Rant: Ham Radio — Hackers’ Paradise
into amateur radio
SP 2013 – PowerShell to Modify Help Setting on Site Collection - SharePoint Gen ...
PowerShell your world cup - Virtu-Al.Net
Welcome to SmartJars, Inc - Get Organized
The effect of Updates - Brian Harry"s blog - Site Home - MSDN Blogs
Docker 101: What it is and why it’s important | Network World
Using a Physical Hard Drive with a VirtualBox VM
How Internet Forensics Changed Criminal Investigations | . . TheSecurityBlogger ...
PowerShell Saturday 005 Atlanta: It"s Time To Part With Blankie: Moving from com...
witsendpoetry
VMware Security Hardening Guides | United States
VMware vSphere 5.5 U1 Hardening Guide Available
Seth"s Blog: Are you solving a problem or creating a problem?
Sell used CDs & DVDs & Video Games & Gadgets
Docker - Debian Wiki
Biztalk 2010 WCF adapters Fail after Installation of .Net Framework 4.5 - MSMQ I...
How to Test a SQL Connection from any Windows Machine - Dave Kidder"s Break-it-D...
Remote Event Receivers in SharePoint 2013 - Voyage - Site Home - MSDN Blogs
Sallys Baking Addiction Whole Wheat Oatmeal Pancakes. » Sallys Baking Addiction
SQL Server 2012 Service Pack 2 (SP2) RTM has released. - Microsoft SQL Server Re...
RUNNING .NET APPLICATIONS ON A RASPBERRY PI THAT COMMUNICATES WITH AZURE - Bruno...
Request Management in SP2013 - Voyage - Site Home - MSDN Blogs
Use of SQL 2014 with TFS 2013 - Brian Harry"s blog - Site Home - MSDN Blogs
Scott Hanselman"s 2014 Ultimate Developer and Power Users Tool List for Windows ...
PowerShell is King–Use PowerShell to find out the file information in a file rep...
Reusing Existing Configuration Scripts in PowerShell Desired State Configuration...
Active Directory Phone Numbers and Line URIs: Together at Last! - Lync PowerShel...
Slow Boot Slow Logon (SBSL), A Tool Called XPerf and Links You Need To Read - As...
Demo: Pure CSS speech bubbles – Nicolas Gallagher
How to work LibreOffice into your book creation process
Research - Automatic Maintenance in Windows Server 2012 R2...
psexec \\SERVERNAME -s schtasks /change /tn "\Microsoft\Windows\TaskScheduler\Maintenance Configurator" /DISABLE
SharePoint: Your Fastest, Out-of-the-Box Application Development Environment - C...
Videos from the PowerShell Summit — Steven Murawski
Designing Puppet – Roles and Profiles. - - Craig Dunn"s Blog
mdtguy.files.wordpress.com/2014/04/deploymentmadesimple.pdf
Research - Beyond Zip - How to store 183 GB of VMs in a 16...
archives
Research - Creating the MDT 2012/2013 Deployment share usi...
Research - Mastering screen resolution settings in MDT 201...
BitsPerPel=32 VRefresh=60 XResolution=1 YResolution=1
Rethinking Driver Management in MDT 2013 « J. Gregs Brain Corral
inject different drivers into a pre-built image?
Out in the Open: The Little-Known Open Source OS That Rules the Internet of Thin...
How to manage Out-of-Box Drivers with the use of Model Specific Driver Groups in...
Apply hotfixes during task sequence | The knack
script
Research - MDT 2013 Lite Touch Driver Management
wissel.net :: Let"s ditch IBM Notes and Domino
LawNerds.com: The Law Student"s Guide to Law School
rc.local, Cron Style | Linux Journal
dinedal/textql · GitHub
the templating website for all: Scripts
CleverWorkarounds » Rewriting the knowledge management rulebook… The story of “G...
maps
PowerShell: predict the future via TechEd - Windows PowerShell Blog - Site Home ...
Using Metasploit To Bypass Anti-Virus Software - Generating and Obfuscating Payl...
How To Blur Faces In Videos »
HOW TO BLUR FACES IN VIDEOS
How to change MAC address in Linux? | blackMORE Ops
How to monitor Nginx web server from the command line in real time - Linux FAQ
GetSID of the user,object: Registry, WMIC, PowerShell - Gaurav"s Blog - Site Hom...
Why Agile? - J.D. Meier"s Blog - Site Home - MSDN Blogs
Easy way to install Telnet on Windows Server 2012 - Michael Pedersen"s Blog - Si...
PowerShell Snippets Pt. 2 - Michael Pedersen"s Blog - Site Home - MSDN Blogs
Sleuthing a BSOD - Jim Blizzard"s Blog - Site Home - MSDN Blogs
How to Remotely PXE Boot a Computer - DeployHappiness
Introducing nagios-herald « Code as Craft
organic fertilizer: excel: my first use of power query (and i love it)
just
Data compare between tables in SQL Server - MS-Tech learning with Prasant - Site...
Using PowerShell to Get a List of Groups from Active Directory - The Blog of Tod...
Using PowerShell to Set Properties on a List of Groups - The Blog of Todd
Automatic: An Auto Accessory to Make You a Smarter Driver
Edyn: Welcome to the connected garden. by Edyn — Kickstarter
How LEDs are Made - Learn.SFE
DNS Records that are required for proper functionality of Active Directory - ser...
Friday Fun with Formatting through PowerShell
Update on the Service Pack plans for SQL Server 2008 and SQL Server 2008 R2. - M...
The database principal owns a schema in the database, and cannot be dropped | Ba...
Crib Notes on the 6 Best Personal Finance TED Talks
Erik A. Dewey
Meet Google Keep – Save your thoughts, wherever you are – Keep – Google
Blosc
PowerShell Reminder Jobs
Configuring Internet explorer using Group policy preferences | System Admins
How To Turn Your Raspberry Pi Into An Always-On Downloading Megalith
HOW TO CONFIGURE A PROXY SERVER URL AND PORT USING GPP REGISTRY ? - We know IE! ...
Aligning Skills with Real World Business Benefits - Microsoft MVP Mentor Blog - ...
Thanks, Emily! My $0.02 US (unadjusted) on security. - Reed Me - Site Home - MSD...
Waterfall to Agile - J.D. Meier"s Blog - Site Home - MSDN Blogs
SSD Over-provisioning using hdparm - Thomas Krenn Wiki
Breaking Down TempDB Contention - SQLServerCentral
» Linuxaria – Everything about GNU/Linux and Open source How to verify DDOS atta...
Using Netsh Commands for Wi-Fi Management in Windows 8
InfoSec Handlers Diary Blog - De-Clouding your Life: Things that should not go i...
Oak Home Page
How to make spreadsheets in a Linux terminal - Linux FAQ
Articles
Getting started with node.js — mattwhite.me
How to record and replay a terminal session on Linux - Linux FAQ
Webfwlog Firewall Log Analyzer
Satsky.spb.ru: codimension - home page
How to approve the use of open source on the job | Opensource.com
SciPY for Scientists | Linux Journal
Optimize website unit testing with phpUnit
Docker Re-Imagines Server Virtualization
Monitoring pfsense with Logstash / Elasticsearch / Kibana » Raging Computer
Bash Getopts - Scripts with Command Line Options : Tux Tweaks
Docker: Lightweight Linux Containers for Consistent Development and Deployment |...
RegExr: Learn, Build, & Test RegEx
Siege Your Servers! | Linux Journal
Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty in Kali Linux | blackMORE ...
Logstash / Elasticsearch / Kibana for Windows Event Logs » Raging Computer
» Linuxaria – Everything about GNU/Linux and Open source Linux Terminal: Dstat m...
How to manage ip addresses and subnets with phpIPAM - Linux FAQ
PiCore 5.3 Linux is a 25MB operating system for the Raspberry Pi - Liliputing
Raspberry Pi
SubnettingPractice.com
Subnetting Reference Sheet
phpIPAM IP address management | Open-source IP address management
Kendal Van Dyke: Discover, Diagnose, and Document ALL Your SQL Servers On Your C...
Kendal Van Dyke: T-SQL Tuesday #39 - Use PowerShell To Copy A Database To Anothe...
Seiko Epson announces the smallest label printer for Android devices | Android C...
gQuigs" View: Bad Memory HowTo
SQL Power Doc - Home
4 Key Elements of a Killer LinkedIn Summary | The Muse
Creating a DSC Configuration Template
DSC Resource Snippets
Microwave Mason Jar Pancakes
Crustless Mini Quiches Recipe | Epicurious.com
my favorite snacks : packable fruit and yogurt parfait « Food « back to her root...
Ghost "Rows" Buster in SQL Server - TechNet Articles - United States (English) -...
Cool free tool to parse and analyze SQLIO results - Paul S. Randal
Using diskpart and wmic to check disk partition alignment - Paul S. Randal
Recommended Reading List for Young Investors — My Money Blog
Updated – Automating & Charting SQLIO Using PowerShell | Sunit Joshi"s Blog
Kendal Van Dyke: Disk Performance Hands On: Series Introduction
Analog Synthesis: The life and legacy of Bob Moog
Inventor Legends: Edmund McIlhenny - Business Opportunities Weblog
Edmund McIlhenny
200 Best Entrepreneurship Quotes Ever - Business Opportunities Weblog
What you need to know about net neutrality
Get Current Activity in SQL Server instance - Mohamed Sharaf"s Blog - Site Home ...
Setting up an Internal PowerShellGet Repository - Windows PowerShell Blog - Site...
Free Tools for the SharePoint Mechanic Toolbox - Share Poignant - Site Home - MS...
Is SQL 2014 Buffer Pool Extension an Enterprise Edition only feature? - La bodeg...
Service Principal Name (SPN) checklist for Kerberos authentication with IIS 7.0/...
From the MVPs: SQL Server 2014 Performance Enhancements - Microsoft Press - Site...
www2.fireeye.com/rs/fireye/images/fireeye-real-world-assessment.pdf
organic fertilizer: managing local admin passwords
SQL Server 2014 Performance Enhancements - The Microsoft MVP Award Program Blog ...
Test Plan and Test Suite Customization with TFS2013 Update3 - Microsoft Applicat...
Intelligence - Site H...
15 Cheap Staple Dishes From Around the World
Home Repairs That Pay You Back When You Sell
In a connected world, the smartphone remains king — Tech News and Analysis
Internet of Things: Temperature Sensor - Secret Microsoft Communications - Site ...
ShareX - Take screenshots or screencasts, annotate, upload and share URL in clip...
Why tablets are failing miserably in higher education
SharePoint 2013 on SQL Server AlwaysOn, 2014 Edition - Build on SharePoint - Sit...
Practical guidance for TFVC and TFS on Azure IaaS - Microsoft Application Lifecy...
PowerShell: Clean Mailbox Delegates (update) - EMEA Developer Support for Messag...
Building True Multi-Subnet Windows Server Failover Clusters - Build on SharePoin...
10 Articles Every Programmer Must Read
Server Huggers And Henry T Ford"s Faster Horse
Dave Nielsen, creator of CloudCamp and posits that to be considered cloud, a service must be OSSM, standing for: On-demand,Self-service, Scalable and Measurable Weinman posits that cloud should be: Cloud - Common, Location independant, Online, Utility and onDemand.
RingCentral Cloud Phone System, Virtual PBX, Toll Free 800 Number
Migrating Team Foundation Server Databases - Microsoft Team Foundation Server se...
10 Incredible-but-True Facts About Eating Fruits and Vegetables
5 Amazing Online Cooking Shows That Teach You All the Skills You Need
Get — and Keep — Amazing Posture by Doing These 10 Stretches Today
Seth"s Blog: How to make money online
online
How To Marry The Right Girl: A Mathematical Solution : Krulwich Wonders... : NPR
how to collect data for troubleshooting SQL Servers via sqldiag - isilefe - Site...
Deploying Windows 7 VL with MAK (Multiple Access Keys) using MDT 2010 - The Depl...
How to Turn Your Black Thumb Green
Cleaning and Deleting Old Files with PowerShell - DeployHappiness
Cool Tool : FOCA – Network Intelligence Reconnaissance | . . TheSecurityBlogger ...
Deploying Windows 7 - Part 26: Managing Drivers – By Make and Model :: Windows 7...
I Broke I.T.!: Taming All Users Desktop and Start Menu Environment Variables in ...
List of Windows Snap-ins (.msc) and Applets (.cpl) | devdashnull.com
Deploying Windows 7/8 with Microsoft Deployment Toolkit (MDT) 2012 Update 1 and ...
Perspectives - Air Traffic Control System Failure & Complex System Testing
PowerShell - Configure Web Application use IIS in a NuGet Package - Michael Pede...
Update XML File using PowerShell - Sonam Rastogi Blogs - Site Home - MSDN Blogs
TFS and SharePoint - Jim Blizzard"s Blog - Site Home - MSDN Blogs
Bulk Backup and Restore at the tip of your finger - Developer hearted / Relation...
Career Rocket Fuel: Whether You"re A Millennial Or Eyeing Retirement, Here"s Wha...
Whirlpool File Checker finds new and changed files on NTFS drives
Citrus Lane - care packages for parents - baby and child products, parent tips, ...
CRM Reporting and SQL 2012 AlwaysOn Availability Groups – Better Together - The ...
PowerShell: Add/Remove multiple security groups on multiple windows servers - De...
SoftConstructors
MDT CustomSettings.ini Tips & Tricks | MDTGuy.WordPress.com
The pitfalls of Test-Driven Development « Otaku, Cedric"s blog
Load Balancing and ASP.NET - Scott Hanselman
ASP.NET and Load balancing. - CodeProject
NTFS Misreports Free Space (Part 3) - Ntdebugging Blog - Site Home - MSDN Blogs
Ntfs Misreporting Free Space (Part 2) - Ntdebugging Blog - Site Home - MSDN Blog...
NTFS Misreports Free Space? - Ntdebugging Blog - Site Home - MSDN Blogs
Are your disk partition offsets, RAID stripe sizes, and NTFS allocation units se...
Five SQL Server Settings to Change | Brent Ozar UnlimitedBrent Ozar Unlimited
10 Must-Do SQL Server 2012 Security Tasks | GreenSQL
How to add Active Directory user group as login in SQL Server - Stack Overflow
Accidental Collection Database Delete - How to Remove Collection?
SSW - Do you know how to delete a Team Project Collection? - Sydney"s Leading Cu...
Today in Entrepreneurial History: May 11 - Business Opportunities Weblog
User Profile Cleanup with Group Policy - DeployHappiness
AJATT | All Japanese All The Time | You don"t know a language, you live it. You ...
Do It Yourself NAS
Change the service accounts used by TFS, SQL, Reporting Services and SharePoint ...
How To Create An Image Of Your USB Drive
www.everything-microsoft.com
Employee Recognition & Engagement Software | Sparcet
Akemi"s Anime World: Anime Reviews and More
Three Tricks to Make Windows 8 Much Easier and Quicker to Use
Is it time to "Reset the Net"?
Tools for OSForensics - ImageUSB - Write an image to multiple USB Flash Drives
Automated Dump Collection Using Procdump - SGriffin"s MAPI Internals - Site Home...
An "internet middleman" calls out six ISPs for letting connections slow down
Keeping organizations secure in a post-Heartbleed world [Q&A]
2014 Verizon Data Breach Investigations Report (DBIR) | Verizon Enterprise Solut...
QuickVB - Home
SQL Server 2014 New Features - Zen and the Art of SQL Server Maintenance - Site ...
8 Ways to Get Noticed During a Job Search
Defcon 21: secret life of SIM cards | Dangerous Prototypes
SQL Server 2014 Updatable Columnstore Index - SQL Shep - Site Home - MSDN Blogs
Best Practices for CRL Checking on SharePoint Servers - Share Poignant - Site Ho...
New PowerShell Scripting Tools Released - The Deployment Guys - Site Home - Tech...
Build Your Own Weather Dashboard In This Google Spreadsheet Master Class
What Is a Linux SWAP Partition, And What Does It Do?
5 PaaS anti-patterns - Programming - O"Reilly Media
Heartbleed"s lessons - O"Reilly Radar
Benchmark graphics card (GPU) performance on Linux with glmark
Scrot: A Command Line Tool to Take Desktop/Server Screenshots Automatically in L...
The above Cron entry will run every ‘1‘ minute and take screen shots and store them under ‘/media/tecmint‘ directory with filename as date and time. After running script for 1 minute, this is what I found in my ‘tecmint’ directory. Automatic Screen shots Reference Links http://linuxbrit.co.uk/software/ Bio Latest Posts Shambhu Singh I am an Linux sever and Desktop Administrator with over than 4 years of Linux experience. I love Linux and I am actually really interested in the many Linux distributors like Ubuntu, Mint, Fedora, BOSS etc. Linux Services & Free WordPress Setup Our post is simply ‘DIY’ aka ‘Do It Yourself, still you may find difficulties and want us to help you out. We offer wide range of Linux and Web Hosting Solutions at fair minimum rates. Please submit your orders by Clicking Here. 5 inShare Leave a Comment « PREVIOUS POST EasyTAG: A Simple Tag Creator and Editor for Audio and Video Files NEXT POST » Related Post(s): Which Career to Choose: Programmer Vs Adminis
SharePoint 2013: Creating a Development Environment - TechNet Articles - United ...
SQL Server 2014 Managed Lock Priority for Partition Switch and Online Reindex - ...
Seth"s Blog: Get rich (quick)
ZTISetTargetDiskFromHint.wsf – Example script to find Disk Target. | Keith"s Con...
The Secrets of History"s Most Successful Savers
First hands on using SQL Server 2014 - MS-Tech learning with Prasant - Site Home...
SQL 2014 Standard Edition Improvements - SQL Shep - Site Home - MSDN Blogs
Google"s Larry Page: The co-founder"s untold story.
Page eventually wrote down his rules for management: Don"t delegate: Do everything you can yourself to make things go faster. Don"t get in the way if you"re not adding value. Let the people actually doing the work talk to each other while you go do something else. Don"t be a bureaucrat. Ideas are more important than age. Just because someone is junior doesn"t mean they don"t deserve respect and cooperation. The worst thing you can do is stop someone from doing something by saying, "No. Period." If you say no, you have to help them find a better way to get it done.
Cling | ROOT
check_mk magic dust for ignoring stuff ;) | deranfangvomen.de
cisco - ARP broadcast flooding network and high cpu usage - Server Fault
Migrate a content database from SharePoint 2007 to 2010 « Aryan Nava
Securosis Blog | Understanding Role Based Access Control: Advanced Concepts
Interview with David Wheeler on open source in government | opensource.com
David A. Wheeler"s Personal Home Page
@JKevinParker: Calculate the Number of Connections Between Objects
How to tell which Service Pack 1 you have installed on SharePoint 2013 - Todd Kl...
Remove Windows SP1 Backups To Free Up Disk Space - By Ulrich Krause - eknori.de
dism /online /cleanup-image /spsuperseded
It’s Time to Encrypt the Entire Internet | Enterprise | WIRED
Capture screenshot or record screen video (with voice) and upload it with single...
Truncate SharePoint Log Files for All the database in SQL Server « Aryan Nava
Where in I install graylog2 as a linux newb | Michael Ellerbeck
Test Subnet with PowerShell
.NET Native Performance - .NET Blog - Site Home - MSDN Blogs
After Heartbleed -- what has the vulnerability taught us?
Teaching, Playing, and Programming: Ten Years of Purely Functional Data Structur...
Types and Programming Languages
Types and Programming Languages
How to Change a User"s Active Directory Password with PowerShell - Hey, Scriptin...
Reset a user password with PowerShell - 4sysops
LazyWinAdmin: [UPDATE] PowerShell - Monitor and Report Active Directory Group Me...
Command-Line Cloud: gcalcli | Linux Journal
How I Came to Write D | Dr Dobb"s
Microsoft Script Explorer: Next Steps - Windows PowerShell Blog - Site Home - MS...
Birth of Virgin Atlantic | Ravi-TheSun
Remove All but Most Recent PowerShell job
Importance of Primary Host Controller in SharePoint Search 2013 - SharePoint Esc...
17 Techy Travel Tips for Globetrotting Freelancers
Compare Best: Credit Cards | Car Insurance | CD Rates | Savings | Brokerages | M...
wyupdate - Free, open-source updater for Windows programs. wyUpdate applies patc...
font-infography.jpg (1200×722)
OpenStego - Home
5 things to do if you’re going to keep using Windows XP after April 8, 2014 | Sa...
Samsung data center fire causes outage, errors on smart TVs and phones (update: ...
Microsoft to Build New $1.1 Billion Data Center in Iowa | Data Center Knowledge
State of SharePoint Statistics | SharePoint Dragons
BBC News - The spooky world of the "numbers stations"
"It is an old-fashioned means of communication but you have to think of security."
Regular expressions guide | Linux User
Download: .Net Universe 2013 Poster - Le Café Central de DeVa - Site Home - MSDN...
Using SSIS to Backup and Restore Extremely Large OLAP Databases - JohnDesch - Si...
Comparing Hash of downloaded Files with PowerShell - Shawn Cicoria - Site Home -...
Save Encrypted Passwords to Disk with PowerShell - Todd Klindt"s SharePoint Admi...
Migrate data from CSV to SharePoint List – PowerShell | SharePoint Rider
Untitled Document
How to download and install the Windows 8.1 ISO -- using a Windows 8 or 8.1 key
New White-Paper on SQL Server 2014 and Azure Blob storage integration - Rumors a...
Why you should consider cloud as your Datacenter - Wriju"s BLOG - Site Home - MS...
Love the package software visualization
Freeplane | Free software downloads at SourceForge.net
Hddb File Search
even
Garage Floor Coatings Upstate South Carolina
Secure Ideas: Professionally Evil!: Professionally Evil Toolkit - Recon-ng
The Penetration Testing Execution Standard
OllyDbg v1.10
PyInstaller
aptly - Debian repository management tool
licensed
InstalledDriversList - Shows the installed drivers list on Windows operating sys...
FrontPage - py2exe.org
Null-modem emulator | Free System Administration software downloads at SourceFor...
Programme - linux.conf.au 2014 Systems Administration Miniconf
RatticDB
SyScan 2014
Monitor SharePoint Content Database Size « Aryan Nava
Think You Know How To Cook Eggs? Chances Are You"re Doing It Wrong : The Salt : ...
DNSSEC Part II: the Implementation | Linux Journal
Commodore Pi
Cooking for Beginners: 10 Recipes for Kitchen Newbies
10 Easy Exotic Meals You Should Be Making
SQL Server 2014: TEMPDB Hidden Performance Gem - CSS SQL Server Engineers - Site...
Walkthrough – Upgrading TFS 2013 RTM to TFS 2013 Update 2 (RTM) - Microsoft Team...
Hello, Chromebook!
Qualys SSL Labs - Projects / SSL Server Test
Heroes of Hardware Revolution: Bob Widlar
Heartbleed Bug
Building an Enterprise Cloud Strategy - Architecture @ Microsoft - Site Home - M...
How to Upload Files to SharePoint 2013 with PowerShell - Todd Klindt"s SharePoin...
SharePoint warmup script « Aryan Nava
The Field Guide to Data Science « Aryan Nava
Raspberry Pi Compute Module: new product! | Raspberry Pi
SharePoint doesn’t accept the Universal security Groups for granting permissions...
Chocolatey Gallery
Matt Wrock"s Blog | Released Boxstarter v2.4: Test Runner for Chocolatey Package...
PowerPoint and Excel: Perfect Partners for Dynamic Tables and Dashboards - The M...
Security baselines for Windows 8.1, Windows Server 2012 R2 and Internet Explorer...
Crunchyroll - Watch Naruto Shippuden, Bleach, Anime Videos and Episodes Free Onl...
Setting Up Wireless Networking on Your Raspberry Pi
Lurch | The word processor that can check your math
Installing Vagrant on Windows 7 and 8 « Aryan Nava
InfoSec Handlers Diary Blog - "Power Worm" PowerShell based Malware
3 topologies driving IoT networking standards - Programming - O"Reilly Media
Opening Minds to the Spheres Among Us | Linux Journal
CIO Engage: Drag-and-Drop Cloud Orchestration w... | CSC Engage Public Community
18 commands to monitor network bandwidth on Linux server
TechNet Data Collector Set for SharePoint back-end: SQL Server
Big Data – From Descriptive to Prescriptive « Aryan Nava
NoSQL Databases Family « Aryan Nava
Customizing SharePoint 2013 global navigation « Aryan Nava
35 Grocery Items You Should Make at Home (and 5 to Buy)
4 Keys to User-Friendly Cyber Security - Business Opportunities Weblog
Windows Server 2012 R2 is Generally Available for NetWeaver Applications April 2...
Some misconceptions about uninstalling SQL Server 2008 (and SQL Server 2008 R2) ...
General best practices for performance (Windows)
SharePoint 2013 - User identity pass-through delegation does not work with BCS a...
TFS 2013.2 (Update 2) Released - Brian Harry"s blog - Site Home - MSDN Blogs
SharePoint Topology add-in for Visio - Chris Hopkins" Blog - #makinitdostuff - S...
v6 only Puppet master (on Debian Wheezy) | Jens" BLOG
Creating KPI dashboards by connecting Visio to a SharePoint List
Lingua.ly
Making a Business Case for SharePoint 2013 - SharePoint from the Trenches - Site...
Scripts to dump installed drivers and applications | Keith"s Consulting Blog
SharePoint Web Apps versus Site Collections - SharePoint from the Trenches - Sit...
SQL Server 2014’s new cardinality estimator (Part 1) - CSS SQL Server Engineers ...
Securing Windows XP After April 2014 - Build on SharePoint - Site Home - MSDN Bl...
Red Ventures - Customer Acquisition Marketing, Charlotte, NC
Summary — Possum 0.5.0
Big Data Architect, Requirements and Responsibilities « Aryan Nava
How to find SQL Server configuration files « Aryan Nava
PowerShell Script to Query UserAccountControl Flags - Obscurum per Obscurius - S...
MongoDB Cheat Sheet – Quick Reference Guide « Aryan Nava
The Log File Navigator
WebApplicationProxy and SharePoint 2013: "Internet Explorer cannot display the w...
Command line options available to uninstall Internet Explorer - We know IE! - Si...
Create Event Log Sources using PowerShell - Ken O" Bonn - Site Home - MSDN Blogs
Mobile Computer Repair Greenville SC | Total CTRL IT
SelfADSI : The ADSI Scripting Tutorial / The LDAP Scripting Tutorial
Phishing Security Test | KnowBe4
Friday Fun: Create All PowerShell Profile Scripts
terran computational calendar
More Fun with String Properties
LVM, Demystified | Linux Journal
Get Rid of Orphaned Content Types in SharePoint 2013 « Aryan Nava
mortar-public-site-content.s3-website-us-east-1.amazonaws.com/Mortar-Pig-Cheat-S...
Free eBooks on Hadoop! « Aryan Nava
DailyTech - New Encryption System "Mylar" Encrypts Data in Browser Before Reachi...
Life Lessons That Kids Teach Us
The 5 Commandments for Saving Time and Reducing Stress - by Dumb Little Man
Best practices for installing TFS updates - Microsoft Team Foundation Server set...
PowerShell –EncodedCommand and Round-Trips - Lessons Learned - Site Home - MSDN ...
7 steps to bringing your organisation into the cloud - Microsoft UK Government B...
Changes in Ribbon UI for SharePoint 2013 - SharePoint Escalation Services Team B...
Learned something new on IIS Compression - Darren Liu"s Dynamics Blog - Site Hom...
PowerShell for N00bs: Libraries, Paths, and You - Lessons Learned - Site Home - ...
Git for Team Foundation Developers–Branches - Kirk Evans Blog - Site Home - MSDN...
MSDN Blogs
Expect Automation Examples
Dumb Grammar Mistakes You Shouldn"t Make, But Probably Do
PC to Portable workstation/toolbox
Cool Tools – Quick Door Hanger Brackets
Convert a String to a PowerShell Property Name
Managing Internet Explorer Trusted Sites with Group Policy - DeployHappiness
Stefan Goßner - Site Home - TechNet Blogs
Swagger: A simple, open standard for describing REST APIs with JSON | Reverb for...
An important fix for SharePoint Foundation 2013 SP1 has just been released - Ste...
The Data Science Laboratory Series is Complete - Carpe Datum - Site Home - MSDN ...
Description of the SharePoint Foundation 2013 update 2760625: March 20, 2014
SQL Server 2014 and SharePoint supportability - Ron Grzywacz"s Blog - Site Home ...
SQL Server 2014 Columnstore Indexes: The Big Deck - Jimmy May, Aspiring Geek: SQ...
7 Days of Agile Results: A Time Management Boot Camp for Productivity on Fire - ...
Links to deployment guides for all versions of the .NET Framework - Aaron Stebne...
SharePoint 2013 noderunner.exe process information - Kristopher Loranger - Site ...
Scripting Best Practices, or Write-Host Considered Harmful - Lessons Learned - S...
SQL Server Data Tools for SQL Server 2014 is available - SQL Server Data Tools T...
Keybase Wants To Bring Encryption To The Masses. Here"s How.
iCalendar Validation
A non-commercial service in support of responsible home heating with wood - wood...
hostsController: Download | VanceLanceDance
Trace Spy - Download: TraceSpy.exe V2.0.0.0
Deep Dive into SharePoint Topologies and Server Architecture for Sh...
karlseguin/the-little-mongodb-book
openmymind.net/mongodb.pdf
SharePoint, Office365 & Yammer Nuggets of weeks 11 & 12 - Ragnar Heil: SharePoin...
DIY CNC Dust Collection Really Sucks!
A Brief History of BASIC - Small Basic - Site Home - MSDN Blogs
How DNS works - Linux FAQ
Hadoop Interview Questions for Newcomers « Aryan Nava
What’s New in SQL Server 2014 « Aryan Nava
Using VSAN With Storage Arrays - Chuck"s Blog
Troubleshooting Claims to Windows NT Token Service (c2WTS) in SharePoint 2010 ma...
Verifying whether the broken piece is c2WTS or Active Directory - Rodney Viana"s...
Wizard Wall Home
SharePoint Conference 2014 Videos & Slides « Aryan Nava
Understanding Information Architecture by Peter Morville on Prezi
Transform a SharePoint Web Part Zone into jQuery Tabs « Aryan Nava
VSAN - The Unspoken Truth | Technodrone
Distributed Cache Service In SharePoint 2013 | Richard Skinner
Document Libraries FAQ - Visual Studio LightSwitch Team Blog - Site Home - MSDN ...
Paradigm Check Point: Prefacing Debriefings | Kitchen Soap
Too many files causing RAM pressure? (a.k.a. DynCache to the rescue!) - Esoteric...
RAM
SharePoint 2013 Distributed Cache (AppFabric) Troubleshooting - Build on SharePo...
SQL Server 2014 Will Release April 1, 2014!! | Jason Volpe"s Blog
SharePoint 2013 SP1 FAQ (updated) - Stefan Goßner - Site Home - TechNet Blogs
How to store the SQLBPA recommendations in a SQL database to make more use out o...
Upgrading an Existing SharePoint 2013 Farm to Windows Server 2012 R2 - Build on ...
OpenFL - Creative expression for desktop, mobile, web and console platforms
Using RANCID/clogin to run commands on multiple devices
Statistical Proof of Lifestyle Inflation! — My Money Blog
Home | Ytria - Essential tools for IBM Notes and Domino administration and devel...
Index of /presentations
SQL Swiss Army Knife #13 – Exploring the plan cache – Part 2 - Blog do Ezequiel ...
Verify a success of database backups | Basit"s SQL Server Tips
Windows 8 | 7 Tips, Tricks, Help, Support, Downloads, Features
Response: Clear Sans - Free and Open Font For Your Diagrams - EtherealMind
Clear Sans | 01.org
Upgrading local Lotus Notes templates
I Love Lotus Notes
Lotus Guru :: Best Notes Templates for Newbies
Living Wage Calculator - Introduction to the Living Wage Calculator
28 facts about pi that you probably didn"t know - Network World
The death of agile? - Reed Me - Site Home - MSDN Blogs
Disk Partition Alignment for Windows Server 2012, SQL Server 2012, and SQL Serve...
Friday Fun: Find File Locking Process with PowerShell
Simple 6x USB charger with current monitor | Dangerous Prototypes
UPX: the Ultimate Packer for eXecutables - Homepage
Samuel Murray"s page of AutoIt scripts
Bandwidth: a memory bandwidth benchmark for x86 / x86_64 based Linux/Windows/Mac...
5 reasons foreigners find it hard to become friends with Japanese people ‹ Japan...
Useful IE Keyboard Shortcuts for Tabs - mschray - Site Home - MSDN Blogs
pfSense Remote syslogging over Linux | A Developer"s Life
Pocket Survival Guide - EMC Celerra
Replicant project
HowTo: Setup SSH Keys on a Linux / Unix System
Multi Site Clusters for SAP on SQL Systems: Recommendations & FAQ - Running SAP ...
Martin Melchior"s homepage: Give your old phone chargers a second life
This Interview Technique Will Get You Hired
Installing SharePoint 2013 SP1 on Windows Server 2012 R2 | Richard Skinner
March release of EWSEditor 1.9.0.22503 - Updated for Exchange 2013 SP1. - Dan"s ...
The 10 Things Everyone Should Be Saving For
10 No-Sweat Workouts Perfect for the Workplace
PowerShell.org | Resources and Q&A for PowerShell People
RST Fiber Optic Network
Restore Database from a UNC path – Why SSMS doesn’t show network drives/paths in...
Protected Networks in Windows Server 2012 R2 - Ben Armstrong - Site Home - MSDN ...
sp_updatestats Is Not Smart | Home Of The Scary DBA
Download Windows 8.1 User Readiness Toolkit from Official Microsoft Download Cen...
CredLocker – Storing PSCredentials to File - Lessons Learned - Site Home - MSDN ...
SQL Server backup history and restore history - Brad Chen"s SQL Server Blog - Si...
www.cs.bham.ac.uk/~udr/papers/EssenceOfReynolds.pdf
TrustedSec - Information Security Made SimpleTrustedSec
I2P Anonymous Network
Searching GPOs for that Specific Setting - DeployHappiness
Error code 0x800F0906 | System Admins
jimdigriz/catnip
TreeLine - News
Gitblit
Securosis Blog | Advanced Endpoint and Server Protection: Detection/Investigatio...
Interesting facts about Raspberry Pi - Linux FAQ
Electronic-Lab in a Box
Brian Z"s Awesome Blog: Mobile Electronics Workbench
Install uGet Download Manager 1.10.4 in Debian, Ubuntu, Linux Mint and Fedora
Copying SQL Server Backups to Windows Azure Storage using AzCopy - David Browne"...
Windows Azure – 101 Stuff and a mention of our TFS on Azure IaaS POC - Willy"s R...
Aegisub Advanced Subtitle Editor
MAXMALI.COM | ripper – the different CNC
The mystery of the Zombie RAM | josh.com
March 2014 Update - Visual Studio Online "Monaco" - Site Home - MSDN Blogs
A concrete approach to learning how to program - Programming - O"Reilly Media
Using Django and MongoDB to Build a Blog | Linux Journal
Manage SharePoint incremental crawl index deletion | SharePoint Rider
Discovering SharePoint: From Novice to IT Pro
Choosing the right SQL Server 2012 Edition for BizTalk Server 2013 - feseca - Si...
Cool Tools – Wiring Complete
Low-Protein Diet May Extend Lifespan | Science/AAAS | News
PowerShell Automation from .Net - EMEA Developer Support for Messaging Team Blog...
PowerShell Script to Limit SharePoint Site Templates Available
In The Next Version - Microsoft Announces Office Graph - Connecting People And C...
AD FS Configuration – SSL certificate must be from a public certificate authorit...
SharePoint AD Failover Review - Build on SharePoint - Site Home - MSDN Blogs
9 (relatively) cheap superfoods
Calculate Heat by solving for Thermal Resistance and Power Dissipation
Setting the Default Logon Background with Bing Images and Group Policy - DeployH...
What version of SQL am I currently running? - VSALM - Site Home - MSDN Blogs
sp_reset_connection – Rate Usage (Don’t fight over the grapes) - CSS SQL Server ...
Internet Explorer Maintenance go away when IE 10 is installed | System Admins
Visualizing Wal-mart - The ShiSh List - Site Home - MSDN Blogs
www.econ.umn.edu/~holmes/papers/ecta7699.pdf
D"Bug"s Life: Desktop Air Conditioning
checking the status of SQL services and databases on multiserver environment - i...
how to find long-running queries and send as an email - isilefe - Site Home - MS...
Managing SQL Servers in multi-server environment via Central Management Server, ...
Managing SQL Servers in multi-server environment via Central Management Server, ...
Managing SQL Servers in multi-server environment via Central Management Server, ...
Managing SQL Servers in multi-server environment via Central Management Server, ...
PowerShell Script Switches Printer Configurations Between Sites | sepago
Elasticsearch.org Kibana | Overview | Elasticsearch
Graylog2 - Open source log management and data analytics
OSSEC, the free and open source IDS | Doug Vitale Tech Blog
How to use KVM from the command line on Debian or Ubuntu - Linux FAQ
Video Contact Sheet *NIX
PowerShell Snippet: Store Login Information Secure in PowerShell using Windows S...
Find and Replace Text with PowerShell
SharePoint 2013 – Your Apps Stuck Loading | Richard Skinner
Setting Up an Awesome SharePoint 2013 Dev Box on Windows Server 2012 R2 - Build ...
How to change SharePoint 2013 application pool account. - Denotation - Site Home...
The Sweethome
iOS 7 has dangerous keylogging vulnerability
AD Replication Status Tool is Live - Ask the Directory Services Team - Site Home...
SharePoint 2013 Mysite creation error: User cannot be found. - Ron Grzywacz"s Bl...
The first Tor Trojan for Android - Securelist
Securosis Blog | Research Revisited: The Data Breach Triangle
DNSSEC Part I: the Concepts | Linux Journal
25 Easy Ways to Make Cheap Cuts of Meat Taste Expensive
Tracking TEMPDB internal object space usage in SQL 2012 - Esoteric - Site Home -...
Giles Bowkett: Towelie Keeps Your Code DRY
ViPR Software Download
The six types of Twitter conversations « Aryan Nava
EDI - Electronic Data Interchange | [The Integration Engineer]
The Evolution of Data Storage
Rebuild all indexes on all tables in the SQL Server database | Basit"s SQL Serve...
How to (semi-)automate JavaScript refactoring - Programming - O"Reilly Media
Recruit Better Data Analysts « Aryan Nava
SysAdmins Should Program — Steven Murawski
axCut: An Open Source Laser Cutter
Gimphelp homepage
Convenience Always Trumps Security | The Many Faces of Mike McBride
Add Logon As Service Right with PowerShell
SQL Agent skipping Scheduled job runs!!– But the Job History does not reveal any...
Automating SQL Service Account/Password Changes - Tim"s blog - Site Home - MSDN ...
Friday Fun: The Measure of a Folder
Hekasoft - Hekasoft Backup & Restore
Philip Flint » Blog Archive » Listing group membership and extracting into a CSV...
Mead Recipes
6.5 gallon GLA
Reducing Domain Sharding « Code as Craft
How do I disable SSL 2.0 in Windows Server? | The Nubby Admin
PeeringDB
25 Simple Recipes for 25 Delicious Veggies
Cogi Voice Recorder: Save All of The Highlights, None of The Noise
Community Tools | CrowdStrike
[Howto] First Steps With Ansible | /home/liquidat – Open Source, Linux and Busin...
Automatically Name Datastores in vSphere? | vNinja.net
OpenKnit | open source knitting
Jerry Nixon @ Work: 15 Easy Ways to Screw Up Your Next User Group Talk. And, a l...
Crossware Mail Signature | Email Signature Software for Exchange & Domino
GaijinPot
How to Setup OMD in 1 Hour | IT on Demand
uberAgent for Splunk • Windows Monitoring • Logon Times and Much More
OCW Bookshelf | Open Matters
15 Reasons You Should Eat More Chocolate
virtuallyGhetto: vdq - A useful little VSAN utility
New functionality in SQL Server 2014 – Part 5 – Backup/Restore Enhancements - Ru...
3 Great Tips for Real-World MSI Packaging - DeployHappiness
Pinning Programs to the Taskbar with Group Policy - DeployHappiness
Friday Fun: The Measure of a File
Finding Disk Hogs (i.e. Large Folders) - Lessons Learned - Site Home - MSDN Blog...
Removing Duplicate Computers From Your MDT Database - DeployHappiness
Today in Entrepreneurial History: February 12 - Business Opportunities Weblog
Automated Material Handling Order Fulfillment System — Kiva Systems
Cheap, Resourceful DIY Mini CNC Router/Mill Contraption
Installing and Building Docker With Ansible | The Ansible Blog
WebPagetest - Website Performance and Optimization Test
Roger Tomlinson | UCGIS
TFS Client Tools - VSALM - Site Home - MSDN Blogs
Should I Remove It?
IBM Notes and Domino 9.0 Social Edition Forum - Notes 9 Basic: Nomad installatio...
I solved the problem for the time being in the following ways: 1. Setup / a / v "NOMAD=1 TARGETDIR=H:\ /qb+" 2. Create a directory --> H:\program files\IBM\Lotus 3. copy including subdirectories --> From "H:\program files\IBM\Notes" To "H:\program files\IBM\Lotus" 4. Execution of the program --> H:\autorun.exe Please try!
What if the annoyances of conference calls happened in real-life meetings. Painf...
5 Infographics to Teach You How to Easily Create Infographics in PowerPoint [ TE...
www.av-comparatives.org/wp-content/uploads/2013/11/avc_rem_201311_en.pdf
How can you get an incomplete ARP?
Free & Public DNS Server List (Updated February 2014)
Understanding and mitigating NTP-based DDoS attacks | CloudFlare Blog
Packets are not being forwarded due to incomplete entries in the ARP table - Cis...
https://s3.amazonaws.com/cah/HouseOfCardsPack.pdf
SharePoint 2013 Adding Server to the Farm: Fast Growing Log Files - Koen Vosters...
Step by Step Teachers Guide to Using Miracast in the Classroom - FE blog - Site ...
Windows Server 2012 R2 Products and Editions Comparison - The blog of Rob Margel...
The TTY demystified
How can I restore all my Tfs Databases from script - VSALM - Site Home - MSDN Bl...
The Alphabet, For Geeks
APIdoc | Point.io
New functionality in SQL Server 2014 – Part5 - In-Memory OLTP - Running SAP Appl...
pgBadger :: PostgreSQL log analyzer
PHP-Calendar
Zorka Monitoring Agent - Zorka Monitoring Agent
BlueWho - Choose language / Scegli la lingua
gExtractWinIcons - Choose language / Scegli la lingua
pshep/ANUBIS
Installing FreeNAS to USB stick (new and simpler way) - CodeProject
When Will My ext Filesystem be Checked Next? | The Nubby Admin
Freenas 9.2.0 with Transmission and Couchpotato/Sickbeard as a DLNA-Server
virtuallyGhetto: Quick Tip: How to quickly find the release & build number on VC...
virtuallyGhetto: How to automate NTP configurations on the VCSA using the CLI
Adding BIOS Updates to Your Imaging Process - DeployHappiness
ArduSat - Your Arduino Experiment in Space by ppl4world — Kickstarter
Fluke 196B Handheld ScopeMeter repair | Dangerous Prototypes
DevOps Distills To... — Steven Murawski
SQL Server 2012 SP1 PowerPivot For SharePoint 2013 Setup Error | Richard Skinner
Optimizing Performance with automatic Proxyconfiguration scripts (PAC) - We know...
Need more DSC Resources? Announcing DSC Resource Kit Wave 2 - Windows PowerShell...
How to analyse IIS logs using LogParser / LogParser Studio - Blog de l"équipe su...
Main Page
The FreeBSD Forums • View topic - FreeBSD vs. Linux: 10 points of superiority (i...
FreeNAS 9.1 - LZ4 Compression
SQL Server Performance Tuning Tips
Identify SQL Servers with inefficient power plans using Policy Based Management
SQL Server 2005/2008/2012 Setup ChecklistBrent Ozar Unlimited
sp_Blitz™: Free SQL Server Health Check Script by Brent OzarBrent Ozar Unlimited
sp_BlitzIndex™ - SQL Server"s Index Sanity TestBrent Ozar Unlimited
Finding pi: Enterprises must dump their legacy ideas and search for radical inno...
Collin’s Lab: Multimeters « adafruit industries blog
Things About ZFS That Nobody Told You | Nex7.com
napp-it.org
bandwidthd.sourceforge.net
@JKevinParker: Discovering SharePoint Content Types and Columns with PowerShell
SisIYA Homepage
Dexterity
Dexterity: Continuous Integration Presentation - Part 2
Dexterity: Continuous Integration Presentation - Part 1
Dexterity: Raspberry Pi CD-ROM Case
What is in the ISA? | [The Integration Engineer]
fulldecent/cameralife
Rapid PHP Deployment for IIS using a Batch File - Robert McMurray"s Blog [MSFT] ...
Home Fileserver: Backups from ZFS snapshots
What happens next? SQL with Windows login / multiple groups… - Esoteric - Site H...
joesdatacenter.com
OpenIoT project | Open Source Solution for the Internet of Things into the Cloud
Iris - mail server integration package
12 Useful Terminal Emulators for Linux
VPN Capability OpenVPN - PFSenseDocs
FrontPage
Statistical computing and graphics begin with R
CityState » Blog Archive » Using acs.R to create choropleth maps
The choroplethr package for R | tech design blog
TeamLab Server Community Version - TeamLab Office
Raspberry Pi: Extending the life of the SD card | ZDNet
Which is best Workflows OR Event Receivers? | SharePoint Rider
ZFS on a USB Disk (removable Media) - blog"o thnet
25 Essential Tricks for Quick and Easy Cleaning
How to winterize your home
virtuallyGhetto: How to restart the ESXi management network via command-line?
esxcfg-vmknic -D "Management Network";esxcfg-vmknic -e "Management Network"
ReInstall Applications Deployed Through Group Policy Software Installation - Dep...
Wordpress Security Esentials Videos | The Many Faces of Mike McBride
Day 7 of 7 Days of Agile Results–Saturday (Have Fun) - J.D. Meier"s Blog - Site ...
Day 6 of 7 Days of Agile Results – Friday (Friday Reflection) - J.D. Meier"s Blo...
SNMP Sweeping - Metasploit Unleashed
ESXi 5.0/GhettoVCB with NFS on FreeNAS 8.2
Ubiquiti UniFi 3.0 Enterprise Wi-Fi Platform Reviewed - SmallNetBuilder
[object Object]
netwerxs/zfs-geek-backup
ZFS saves the day(-ta)! (/var/crash/elowe)
around
Easy, Safe Backups with rsync and ZFS | compilingsheep
UniFi - VLAN switch configuration - Ubiquiti Networks Community
KXStudio
JScreenFix - Pixel Repair
ExifTool by Phil Harvey
SIDUS—the Solution for Extreme Deduplication of an Operating System | Linux Jour...
Google Map Gps Cell Phone Tracker - Browse Files at SourceForge.net
Lotus Notes to SharePoint Migration - Anything Microsoft... - Site Home - MSDN B...
Using PowerShell to edit MP3 tags - Todd Klindt"s SharePoint Admin Blog
Creating a manual VSAN Cluster with PowerCLI - Virtu-Al.Net
Day 5 of 7 Days of Agile Results – Thursday (Daily Outcomes) - J.D. Meier"s Blog...
GifCam | BahraniApps Blog
Imagenator - Home
Create, convert, rotate, secure, crop and generally tweak your PDFs with PDFFill...
Day 4 of 7 Days of Agile Results - Wednesday (Daily Outcomes) - J.D. Meier"s Blo...
How to Stop a MSI from Rebooting - DeployHappiness
PiHUB - Pimoroni
Paperless office? Screw it!
The 24-Hour SharePoint Conference - Home
GitHub"s Public Speaking Culture
Rule One of Management: First, Do No Harm - Chad Fowler
Douglas Adams" last post on his online forum was about excitement over Mac OS X ...
"I"ve come up with a set of rules that describe our reactions to technologies: 1. Anything that is in the world when you"re born is normal and ordinary and is just a natural part of the way the world works. 2. Anything that"s invented between when you"re fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. 3. Anything invented after you"re thirty-five is against the natural order of things."
15 Packing Secrets From a Professional Traveler
Day 3 of 7 Days of Agile Results – Tuesday (Daily Outcomes) - J.D. Meier"s Blog ...
DIY FreeNAS based system | dablomatique
VS 2013.1 (Update 1) is available - Brian Harry"s blog - Site Home - MSDN Blogs
spark/thermostat
Best List of Remote SysAdmin / Devops Job Sites | The Nubby Admin
Open Broadcaster Software - Index
Avidemux - Main Page
AVFS - Avisynth Virtual File System
BeHappy - Home
Avisynth wiki
IBM Problem with deleting calendar entry without parent - United States
Notes Migration Projects | Notes SharePoint Blog
7 Days of Agile Results: Day 2 - Monday (Monday Vision) - J.D. Meier"s Blog - Si...
Go-Repairs Blog: DIY Freezing Kit
The Hulabye Diaper Changing Helper...Diaper changes with less wiggle and more gi...
SharePoint 2013 Existing Features GUID | System Admins
viziblr - News - Generating Auto-Incremented Version numbers with PowerShell
Team Foundation Server Usage at Microsoft - The Ultimate Visual Studio Tips and ...
bovine/datapipe
7 Days of Agile Results: Day 1 - Sunday (Getting Started) - J.D. Meier"s Blog - ...
Episode Listing of The Amp Hour Electronics Podcast! | The Amp Hour Electronics ...
Securosis Blog | Cloud Forensics 101
OCS Inventory NG | Home
Magic Smoke: $1 Lithium Coin Cell Charger
recommended
Restart Monitor Automatic Remote In - DeployHappiness
Deploy Windows - MyWiki
Research - MDT 2010 – Inside the Install Roles and Feature...
New functionality in SQL Server 2014 – Part 3 – Low Priority Wait - Running SAP ...
Subgraph Vega | Free and Open Source Web Application Vulnerability Scanner
Working with NIC Teaming in Windows Server 2012
New functionality in SQL Server 2014 – Part 2 – New Cardinality Estimation - Run...
That Target data breach and what it means for consumers
C drive space is using up on terminal server after upgrading to IE10 or IE11 - A...
Joget Workflow – Open Source Workflow Software and Business Process Management S...
How to use ADFS with SharePoint hosted apps in Sharepoint 2013 - SharePoint Esca...
Performing Management tasks using Cimcmdlets [3] – Operating System - Windows Ma...
MDT Scripting: Using VBScript Expressions in customsettings.ini file | Scriptimu...
A Look At ZTIGather Flow and The CustomSettings.INI File
MACAddress001
Computerphile: Learn The History, Hacks & Tech Behind Everyday Computing [Stuff ...
Preserving your privacy and anonymity with Tails | . . TheSecurityBlogger . . .
Perform These 7 Awesome Photoshop Tricks in GIMP
SQL Server 2014: Inside Hekaton Natively Compiled Stored Procedures - Rumors abo...
How to install SharePoint 2013 on Windows Server 2012 R2 | iouchkov
Nikujaga (meat and potato stew) Recipe
Randy Rempel"s Blog : Installing and Configuring SharePoint 2013: Part 4 of 4
Randy Rempel"s Blog : Installing and Configuring SQL Server 2012: Part 3 of 4
Randy Rempel"s Blog : Installing and Configuring the Windows Domain Controller: ...
Randy Rempel"s Blog : Installing and Configuring a Three-Server SharePoint 2013 ...
Top Support Solutions for Microsoft SQL Server - Top Solutions from Microsoft Su...
Doug Hemminger"s SharePoint Musings: Instruction Guide for Installing SQL Server...
Updates | SharePoint 2013 | cumulative updates, patches | TechNet
POV-Ray - The Persistence of Vision Raytracer
Oh!Soft(ohsoft.net) - Best Software Developer
Create a TS Variable in MDT 2012 to set Computer Name to macaddress
Research - Generate computer names in MDT 2012/2013 based ...
Segmentation Fault At Address 0xABAD1DEA
[CONF-32190] Bug in loremipsum macro, typo in sixth word - Atlassian JIRA
aiim.typepad.com/erin020 %282%29.pdf
What books should I read to learn better debugging skills? - Gunnar Kudrjavets -...
What data to collect from a SQL Server failover instance after a problem occurs ...
Research - Windows 8 Deployment - The specified path, file...
PowerShell Script to Enumerate SharePoint 2010 or 2013 Permissions and Active Di...
Weekend Scripter: Using PowerShell to Replace STSADM - Hey, Scripting Guy! Blog ...
Install and Configure MDT 2013 (Part 1) | Philip Flint
Install and Configure MDT 2013 (Part 5) | Philip Flint
Install and Configure MDT 2013 (Part 4) | Philip Flint
Install and Configure MDT 2013 (Part 3) | Philip Flint
Install and Configure MDT 2013 (Part 2) | Philip Flint
Documenting Group Policy Objects | Philip Flint
FAN « Fully Automated Nagios
Security Compliance Manager (SCM)
Installing and Configuring Microsoft Deployment Toolkit (MDT) 2013 on Windows Se...
Research - Adding Internet Explorer 11 to your Windows 7 S...
Deploy Windows 8.1 and Office 2013 with MDT 2013 and the ADK 8.1 | MDTGuy.WordPr...
The Netflix Tech Blog: S3mper: Consistency in the Cloud
How to check Internet speed from the command line on Linux - Linux FAQ
“Battling the growing wave of pred...
Custom. All Custom.
Network Diagrams: Choosing Better and Free Fonts — EtherealMind
TeamWin Projects - TWRP 2.6 - | TeamWin
HOW TO DO EVERYTHING
USDA Food Plans: Cost of Food Cost of Food at Home
Live from the Engadget CES Stage: the EFF"s Julie Samuels
Julie Samuels
Mooshim Engineering
Better Unit Testing with Microsoft Fakes – eBook update v1.2 posted - Willy"s Re...
Windows ODX test (Offloaded Data Transfers) - Shared technical tips from Emmanue...
Mayhem
Lziprecover - Data recovery tool and decompressor for lzipped files
LightProfiler
NETSHe Lab
Network Inventory Lookup Assistant – Freecode
.:: PCAPFiX ::. | REPAiR CORRUPTED PCAP FiLES
Using a RamDisk with Notes Client - By Ulrich Krause - eknori.de
Tools and utilities for Windows
k5n.us: WebCalendar Home Page
A Fast and Secure Web Proxy for Corporate Users | Wazi
StalkR"s Blog: SSH/HTTP(S) multiplexing with sshttp
Here come the Ultrabooks | Linux Journal
Hack and / - Forensics with Ext4 | Linux Journal
Computer Laboratory: Capsicum: practical capabilities for UNIX
Phatch - Photo Batch Processor
dsniff
Ten Things I Wish I Knew When Becoming A Linux Admin | Pinehead.tv
Avoiding Common WordPress Setup Mistakes | Wazi
In The Next Version - The Future Of Work Is Now
ISME - Welcome
GTV Hacker » Blog Archive » Root for Sony Google TV with Unsigned Kernels!
GTVhacker • View topic - NSX-GT1 and NSZ-GT1 exploit to run unsigned kernels!
SSH, the Secure Shell « Doug Vitale Tech Blog
Inspection News, home inspection Information, inspector, radon environmental
CommitMonitor
The Ultimate Steve Jobs Collection | Chill
Offer Your Online Graphical Job Resume To The World With ReVu
RepRap - RepRapWiki
Visiting the Ivory Tower « ipSpace.net by @ioshints
Being Good at IT Stuff
Why Becoming A CCIE Doesn’t Fix Being Inexperienced
How To Land Your First Job Herding Packets
Dare To Be Stupid
Fsck It, We’ll Do It All With SSDs! « The Data Center Overlords
Cloud Computing Infrastructure
Top 10 Security Assessment Tools - LINUX For You
LDAP/LazySysadmin - UCC Wiki
VDI Implementations – Reasons for Poor Projects and Steps to Success « The Virtu...
Tips and Tidbits About LDAP « UNIX Administratosphere
http://www.usbwifi.orconhosting.net.nz/
Teensy USB Development Board
memtester version 4
SSH session logging / recording » WPKG Blog » Blog Archive
Configuring Nagios Client on Debian | Platonic
Using Wii remote with Android Device- Taking Gaming to the Next Level | GooGeZ
Nmap « Doug Vitale Tech Blog
VPN Connection Issue via Verizon wireless broadband air card and Cisco VPN - Cis...
enterpriseios-ios-controller - Open Source iOS MDM solution - Google Project Hos...
GestioIP IPAM - IP address management | Free System Administration software down...
What"s My Heart Rate - Apps on Android Market
Home | Zen Load Balancer - Open source load balancer
G4L | Free Security & Utilities software downloads at SourceForge.net
DocFetcher - Fast Document Search
Roll Out New Clients with FOG’s Advanced Disk Imaging | Wazi
#602271 - netdisco-common: netdisco fails with call to SNMP::Info::_global_layer...
Van Gogh"s Starry Night modded into beautiful interactive light and sound show (...
DS Scheduler | Solar1.net
Disk Drill – Freecode
CrystalDiskMark - Software - Crystal Dew World
ThinkWiki
Windows Scripts and Downloads
HydraIRC [Main Site Index]
Nettalk - www.ntalk.de - IRC-Chatclient
Build and generate php forms with ease - FormBakery
FreeFileSync | Free Security & Utilities software downloads at SourceForge.net
Download MakeUseOf Guides
Apache Directory Studio - The Eclipse based LDAP browser and directory client
Weekend Project: Get Started with Tahoe-LAFS Storage Grids | Linux.com
Lotusphere 2012 session recap: Spark Ideas, Featured by the Nerd Girls
Using Browsers with OpenLDAP cn=config Tree « UNIX Administratosphere
Palmetto Open Source Software Conference | POSSCON 2012
freeseer - open source video studio in a backpack | FOSSLC
Welcome - IP-Link
How To Tie a Tie | All Necktie Knots, Step by Step Video Instructions from 2Tiea...
How can I get a list of MAC to IP addresses on the network?
(uN)Tech blogs
Vat of Knowledge » Vat of Knowledge
DNE Support - Deterministic Networks
Citrix DNE does not work with the native Windows 7 Mobile Broadband driver
12 Reasons Why Every Linux System Administrator Should be Lazy
Lotusphere 2012 Recap
Meet Bill Gates, the Man Who Changed Open Source Software | Wired Enterprise | W...
Yawf – Freecode
Suji"s blog: How to configure proxy for common linux apps
HotFix – RDP 7.0 installed on XP SP3 Machine causes issues with RDP connections ...
OpenMediaVault - Home
Script Warranty Dell
CloudShark brings your CAPTURE FILES to the cloud
Mapped Network Drives with UAC on Windows Vista - The App Compat Guy - Site Home...
Juniper Netscreen Commands | Netscreen
How to Clear the ARP Cache
Simplify Administration with Directory Services | Wazi
FreedomBox Foundation
Nagios Exchange - Icon Set Generator
oraToolKit - The Swiss Army Knife for Oracle
Plop - Documentation / Manual / Examples - Free Boot Manager, builtin usb driver...
Using PowerShell with Internet Explorer - Virtu-Al.NetVirtu-Al.Net
How To Determine a More Accurate SEO Ranking For Your Site
Congelli501 - Download LCD Nurse (v1.0.1)
Producing Open Source Software
mozdev.org - books: chapters/index
We the Media by Dan Gillmor
Folder
Ed Brill - New book-IBM Lotus Notes and Domino 8.5.3: Upgrader’s Guide
MR, FP, FR, IFR, Hotfix, IF - what do they all mean? | IdoNotes (and sleep)
Converting A VMware Image To A Physical Machine | HowtoForge - Linux Howtos and ...
CLICK ONCE ERROR: “An error occurred while signing: Failed to sign bin\Debug\app...
Managing User Profile Service Application permissions using PowerShell - SharePo...
Calomel.org :: Open Source Research and Reference
3 New and free Windows 7 Themes to download, Fractals, Fun Fruit and Japan Dusk ...
AspRangers | Win2003 Server is hanging intermittently due to high NPP (non paged...
Keeping Your Documents Safe - The Microsoft MVP Award Program Blog - Site Home -...
How I Manage Bandwidth Using Trickle On Ubuntu - Ubuntu Portal
Bash One-Liners :: bashoneliners.com
High-Performance Whiteboard Paint | IdeaPaint Product Descriptions
Directory Service Comparison Tool 2.0 B3
ADModify.NET
Ask the Builder - The Home Improvement Resource
OpenManage Essentials - Systems Management - Wiki - Systems Management - Dell Co...
Dell Client System Update - Systems Management - Wiki - Systems Management - Del...
Projectors, Projector Reviews, LCD Projectors, Home Theater DLP Projectors at Pr...
candera/hobocopy @ GitHub
http://www.isc.cnrs.fr/informatique/public_notice/netdisco/netdisco-install-engl...
Linux / Open Source For Kids: A Feast of Riches | Worldlabel Blog
Lotus Notes » Code Nomad
Echoes with John Diliberto
10 PowerShell commands every Windows admin should know | TechRepublic
Downloads - Jazz.net Community Site
Simple PowerShell Script to Bulk Update or Modify Active Directory User Attribut...
Add User Account Information to Active Directory Users and Computers
Friday Fun: A PowerShell Alarm Clock | The Lonely Administrator
PowerShell script for getting Active Directory information | TechRepublic
ADO Search Tips
AD Attributes
Chapter 11. Using external backends
OtterHub.org - OTRS Community • View topic - adding active directory integration
Re: [otrs] ORTS, LDAP and AD groups
Configuring OTRS to make Agents authenticate via LDAP (MS Windows Active Directo...
Presentation Links: Free Active Directory Tools and Tips « Web Active Directory ...
Apple Stores construction suppliers | TUAW - The Unofficial Apple Weblog
OTRS LDAP Authentication for Agents and Customers | marius
#500558 - libapr1: can"t bind to 127.0.0.1 without IPv4 address - Debian Bug rep...
Securing Your ISPConfig 3 Installation With A Free Class1 SSL Certificate From S...
NewerTech® Power2U™ AC/USB Wall Outlet
How To Monitor Remote Linux Host using Nagios 3.0
LeoCAD
WinFF - Free Video Converter
How to install nconf web interface for nagios on debian and ubuntu? - MyLiteratu...
SANS: 20 Critical Security Controls - Version 3.1
Barcode Nerds
Searching Active Directory with ldapsearch | Eldapo | directory management and s...
PC"s Telecom Blog: 100G is unstoppable!
Scalability Experts Tools Downloads | Scalability Experts
racker/dreadnot - GitHub
autokey - Desktop automation utility for Linux and X11 - Google Project Hosting
10+ Useful Commands for Linux Users
User Sovereignty for our Data | Mitchell"s Blog
Weekend Project: Learning Ins and Outs of Arduino | Linux.com
Free Diagnostic Tools | Wormly
swaks - Swiss Army Knife SMTP
Nagios on FreeBSD® 7.2 - BMO
Phoenix: Forgot the SA password in Sql Server 2005
[oucs] 4. Tools and Utilities - Active Directory
SQL Server 2012 Licensing and Hardware Considerations | Glenn Berry"s SQL Server...
Maximum PC | Build Your Own Multitouch Surface Computer
Free Tools | McAfee Downloads
Axantum Software AB | AxCrypt | File Encryption Software
What is GPRESULT and how it helps you | ivan"s blog
MultiRBL.valli.org - Blacklist, Whitelist and FCrDNS check tool
Nagios commands via web-interface on Debian | Lars Schenk
Puppet + Gephi: Visualizing Infrastructure as Code | Atomic Spin
Features | Gephi, open source graph visualization software
Autonomously Organized and Funded IT Groups (EDUCAUSE Quarterly) | EDUCAUSE
Install Open-VM-tools on Debian 6 squeeze | SurlyJake
SourceForge.net: pcapsipdump - Project Web Hosting - Open Source Software
iWitness | Seven Days
Pantone 453
The science fiction effect | Bulletin of the Atomic Scientists
New York Jedi
NirLauncher - Collection of more than 100 portable utilities from NirSoft
KLS SOFT - WSCC - Windows System Control Center
Project OpenGrok
CORNING® GORILLA® GLASS
Red Hat developer explains open source color calibration hardware
GriF: The Grid Framework
Kwatee Agile Deployment
Simple Linux Auditing | HowtoForge - Linux Howtos and Tutorials
HTTPS Everywhere | Electronic Frontier Foundation
Steve Jobs kept letter from Bill Gates on his nightstand | TUAW - The Unofficial...
The Power Base OpenWRT Build Guide: Start To Finish
OEMs are still breaking Windows: can Microsoft fix this with Windows 8? « Tim An...
bad oem, bad!
SharePoint 2010 | Clear SharePoint Cache - Trailblazer"s Sharepoint Blog - Site ...
busdog - USB traffic sniffer - Google Project Hosting
ISO Toolkit 4.0: Freeware to Create, Convert, Copy, Extract and Mount ISO Image ...
groths.org «
Google Books Downloader for Windows and Mac OS X
Advertising Agency Software, Collaboration | Project Management, Time Tracking, ...
HP Communities - SWFScan - FREE Flash decompiler - Enterprise Business Community
ProEject | SoftwareSpot Apps
Unplug USB flash drives safely with RemoveDrive from Softwarecrew | Software Rev...
Using Underscores, Hyphens or CamelCase in Naming Standards — My EtherealMind
Open Hardware Monitor | CPU Temperature, Fan Speed, Voltages, Clocks and More
VMware vSwitch – the baseline of simplicity « ipSpace.net by @ioshints
g4u - Harddisk Image Cloning for PCs
OSFClone - Open source utility to create and clone forensic disk images
Home Climate Control
chriscontrol - All in One RDP & VNC Remote Control - Google Project Hosting
Feasty Geeks: Pan Galactic Gargle Blaster Recipe
Home | BackBox Linux
Home
Basic Chemistry on the GNOME Desktop | Linux Journal
The 9 Best Low-Cost RADIUS Servers
GLPI - Gestionnaire libre de parc informatique
openDias - project portal
MALODOS
Frescobaldi: Edit LilyPond sheet music with ease!
Userful MultiSeat Linux 2011 Complete Virtual Desktop School Computer Education ...
AIX monitoring CPU
The BIRD Internet Routing Daemon Project
ISO Master
The Moth | True Stories Told Live
URANOS
TidBITS Problem Solving: iSesamo: Building a Better Spudger
Tom Bihn Cadet laptop / iPad bag organizes your belongings in style | TUAW - The...
ossbuild - Open Source Software Build Environment - Google Project Hosting
Resolve Performance Problems Associated with Authentication Scaling
Solved: Laptop Monitor Green lines - PC Help Forum
HP dv7-3173nr Laptop Screen Replacement Procedure - YouTube
dv7-3173nr
Microsoft Adds Data Deduplication to NTFS in Windows 8 – @SFoskett – Stephen Fos...
[CMC] Cyanogenmod Compiler [Alpha] [Dec 29 2011] - xda-developers
Update on Bootloaders | Facebook
16" - e1649Fwu - Monitors - AOC - North America: U.S.
Nagios Exchange - SQLServer
Viber | Free calls, free voip, free phone calls from iPhone and Android
Raspberry Pi | An ARM GNU/Linux box for $25. Take a byte!
Scripting News: The Un-Internet
Editorial: How FAA-certified gadgets could improve air travel and eliminate the ...
Steve Jobs and Japan | Nippon.com
Issey Miyake
Pieceable
How to Use Wi-Fi Sync for iPhone, iPad, & iPod touch with iOS 5
Verify firewall settings and that TCP ports 123 and 3689 in addition to UDP ports 123 and 5353 are open and accessible (these are ports iTunes uses)
Now Hovering Above Us All: "The Cloud" : NPR
Timeline: A History Of Touch-Screen Technology : NPR
Daily DNS Changes & Web Hosting Activity - DailyChanges.com
Development of Computer science and technologies in Ukraine. Brief History
baresip - Open Source SIP User Agent
Official Google Blog: Remembering a remarkable Soviet computing pioneer
PowerShell script for generating a Visual Studio profile - All you need is code ...
Enable Multiple Desktop sessions for windows 2008 or Windows 7 - Rajakedar Ganta...
partkeepr.org Âť
NASA - Hubble Serves Up a Holiday Snow Angel
My Computing Handbook: Using Ketarin to fetch the latest freeware updates from s...
How do I get the full path for the target of a shortcut file? - The Old New Thin...
News - UFO:AI
OpenRA - Home
Badcaps.net - Badcaps Home
Computer Capacitors
LCDalternatives
James Kibbie - Bach Organ Works - Download
New nanotube battery technology leads to blisteringly fast recharges, improved s...
Leprechaun Cider
Beer of the Month Club - Microbrewed Beer Clubs International and Domestic
» 7 Facts Your Doctor Won’t Tell You
15 Ways to Exercise in Under 5 Minutes | Wise Bread
Raw Food Diet – Day 1
ally I doně°˝€™t like eating plain raw celery, unless itě°˝€™s slathered in almond butter and topped with raisins, or maybe with some
Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWAS...
Mutillidae
LinuxLive USB Creator
How To Make A USB Installation Disk For Windows 7 Without Extra Software
10 Cool Uses Of Wolfram Alpha If You Read And Write In The English Language
virtuallyGhetto: Ghetto webAccess for ESXi
Bodge ÂŤ The Angry Technician
VM Start-up script
PowerCLI: Shutdown your Virtual Infrastructure
virtuallyGhetto: Retrieving Information from a Distributed vSwitch
Auto Installation and Configuring of vSphere ESXi 5 | vNinja.net
Secure Server Unit | RackSolutions
MIT"s got a way of using encrypted data without decrypting it, next stop, travel...
Liquid War 6 - GNU Project - Free Software Fundation (FSF)
WebHome < Home < Foswiki
Improving the Multi-Monitor Experience in Ubuntu ÂŤ Canonical Design
PacketFence: Open Source NAC (Network Access Control)
grml.org - Debian Live system / CD for sysadmins and texttool-users
SquidGuard Manager
How to Disassemble and Upgrade the ASUS G53SX/SW
Linux: 20 Iptables Examples For New SysAdmins
Radio on the Computer
You Have Downloaded - We show what you downloaded
[ubuntu] How to Mount Clonezilla Images - Ubuntu Forums
wissel.net :: DOTS and the eMail life cycle
Xerox"s Palo Alto Research Center founder Jacob Goldman passes away at age 90 --...
Bootstrap, from Twitter
SANS: 20 Critical Security Controls
Green Mountain
HTTP Archive - Trends
How do I clone a hard drive with Clonezilla? | TechRepublic
Installing RANCID on Debian GNU/Linux « smz"s blog
TACACS+ stuff
Linux Systems Capacity Planning | Linux Journal
ownCloud web services under your control
How To Encrypt Mails With SSL Certificates (S/MIME) | HowtoForge - Linux Howtos ...
Nmap Network Probing Cheatsheet | Wazi
***READ BEFORE POSTING*** Common Problems & Useful Threads ***READ BEFORE POSTIN...
ClouDNS.net: Free DNS hosting
open-ig - Open source reimplementation of Imperium Galactica - Google Project Ho...
Dave"s Daily Deals
[1112.1645] How to Gamble If You"re In a Hurry
WikiCFO:Best Business Practice Idea for CFOs
to
The Power Base – LightScribe in Linux: Make Gorgeous Discs in Ubuntu - The Power...
FreedomBox - Debian Wiki
Threaded-Samba-Scanner – Freecode
SemanticScuttle | Free software downloads at SourceForge.net
delicious replacement?
Linux Forums - Backup all databases nightly w/ mysqldump
AirDroid-Enjoy your Android Experience over the air
Bufferbloat
CMAND: Transport Traffic Analysis: SpamFlow
Gallery | Your photos on your website
large
Fork Yeah! The Rise and Development of illumos
MicroDNS: Give an IP to any query
Default
iPXE - open source boot firmware [start]
IT Service Management Software - Free Open Source Help Desk - Problem Management...
Introducing DNSCrypt (Preview Release)
Roundup Issue Tracker - Roundup 1.4 documentation
Configuration Management for Agile System Administrators - CFEngine
Tiki Wiki CMS Groupware | Tiki Wiki CMS Groupware - Software made the wiki way.
MacBook Screen Protector, LCD Display Cleaner, Keyboard Cover for MacBook, MacBo...
The Bro Network Security Monitor
Apache Traffic Server
Dingleberry jailbreak
SSH Analysis
DNS Best Practices, Network Protections, and Attack Identification - Cisco Syste...
juuso/BozoCrack - GitHub
Pwnf4.jpg (JPEG Image, 1400 × 2424 pixels)
The case of the 500-mile email
The Washington Post and a Higher Military Standard
noplay/situation-room - GitHub
OpenMeetings | Open Source Web-Conferencing
HP Smart Array - When is Magic Just an Illusion?
RegScanner: Alternative to RegEdit find/search/scan of Windows
The Produce Worker"s Guide to Storing 25 Common Fruits and Veggies | Wise Bread
Impress the Future Boss: 9 Interview Mistakes to Avoid | Wise Bread
libvirt Virtualization - Open Source Network Monitoring and Systems Management
ByteSphere"s MIB Download Area
Oidview Free MIB Browser Download
sysadvent: Day 5 - Tracking Requests with Request Tracker
Open Blocks Download Page | MIT STEP
ArduBlock
Introduction to Stepper Motors | Sleep is overrated…
» Kids & Money: Teaching Gratitude
» 5 Tips for Your First Job Interview
Sumo Dojo – Talking about outsourcing and how we do it | Neville"s Financial Blo...
Toastmasters Speech Series: Your Guide to the First 10 Speeches
Rapid history extraction through non-destructive cache timing (v8)
CalMail Updates | UC Berkeley IST
VMware Paper – vSphere High Availability Deployment Best Practices « The Virtual...
xed
INFOGRAPHIC : The History Of The Modem
The Official YAML Web Site
keynote-nf - KeyNote NF (New Features) - Google Project Hosting
Leave Some RAM For Filesystem Cache - The Lone Sysadmin
Align Your Partitions - The Lone Sysadmin
TechnoLawyer Blog: BigLaw: Upgrading Your Large Law Firm to Office 2010 and Gett...
outSSIDer WiFi scanner
SNMP Informant - software that allows you to use SNMP to monitor your Windows in...
Zittrain in Technology Review: The personal computer is dead
Security: Linux, OS X, Unix and Malware (Viruses) « The ERACC Web Log
About NewsBlur
Fwink — Free Webcam Software
Guide to rsnapshot and incremental backups on Linux
YaCy Search Portal using a Load Balancer over Distributed Peers
Netflix Benchmarks Cassandra on AWS - ReadWriteCloud
Open Security Research: Setting up a Password Cracking Server
A Bushel of Free, Open Source Tools for Working with Digital Photos
Cooliris
Weekend Project: Run Your Own Q&A; Site with Coordino | Linux.com
Coordino - Home - A FREE PHP StackOverflow Clone
The rules of the game - a conversation with Dave Neary - The H Open Source: News...
» Linuxaria – Everything about GNU/Linux and Open source opensource Asset Managm...
NeonView 0.6.0 Released With New Features
Mexican Army Dismantles Gang"s Antennas, Radios : NPR
BSTJ version of C.ACM Unix paper
The Strange Birth and Long Life of Unix - IEEE Spectrum
PATRIOT Act clouds picture for tech - POLITICO.com Print View
Newfies, the Open Source Voice Broadcast software for Freeswitch
Candela Technologies - Stateful IP Traffic Generators and Network Emulators.
LibrePlan: Open Web Planning
Everything Sysadmin: The Limoncelli Test: 32 Questions for Your Sysadmin Team
Love this!
Crowdin.net - Collaborative translation tool
Back-up of Documents and CD Burning Process - Kettering University
The Columbia University Intrusion Detection Systems Lab
New Study Reinforces Case for DC Power Savings » Data Center Knowledge
Version Control Demystified, Part 1: Version Control in Apps you already use
Version Control Demystified, Part 2: A Subversion Primer
etckeeper
5 Creative Uses For A Virtual Box That You Probably Never Considered
Try Out Windows 8 In VirtualBox Right Now For Free
NETRESEC NetworkMiner - The Network Forensics Analysis Tool
Jamison Scheeres – Social Engineering is a Fraud Derbycon 2011 (Hacking Illustra...
GNU Gatekeeper - a free VOIP Gatekeeper for H.323
mintty - Terminal window for Cygwin and MSYS - Google Project Hosting
Gow – The lightweight alternative to Cygwin - GitHub
gow - Unix command line utilities installer for Windows.
darning
SandBox - Projects by Darkrose - csvDB
quicksynergy - Synergy in a single click - Google Project Hosting
Amazon.com: TRENDnet USB to Serial Converter TU-S9 (Blue): Electronics
The Sketchbook of Susan Kare, the Artist Who Gave Computing a Human Face | Neuro...
Official SkyDogCon 2011 Page
How Private Is Your Email? It Depends : NPR
Drive Tools for Windows
I...
More Slick OpenSSL Tricks | Wazi
TripleA - TripleA
Delegation of Mailbox Access Rights to another user using PowerShell Commands: -...
sinfo-Advanced Network Monitoring | Linux Journal
sinfo
Tip: Understanding the availability reports in Nagios Core | Oleksiy Gayda"s Tec...
SAPO Codebits 2011
From lolcat to textspeak: How technology is shaping our language | Software | si...
Bugwise | foocodechu
Online Webinar Software, Web Conferencing Software, Live Webcasting Software,Mob...
wissel.net :: Workflow and Organisational Directory
NetFPGA
Applidium — Cracking Siri
plamoni/SiriProxy - GitHub
the history of computing project
Live Sketching | surf the edge
Matthew Wronka - Projects - Murder
Corosync [welcome]
Grokking the GIMP - Learning Advanced Image Editing Techniques
Free Tools for Getting Started with the Mighty GIMP Graphics Editor
User-friendly SVN
Salon 21st | The Richard Stallman saga, redux
4MLinux.com
Psensor | wpitchoune
Common Errors in English Usage
Maqetta
The Helpful Hacker - A Simple OpenBSD Router For Your Virtual Machines
Stanford University online courses for free
What got you interested in technology? IT"s rich and famous share their memories...
Linux Forums - Test To Give When Hiring or Interviewing a Junior Linux System Ad...
oVirt
Steve Jobs and the Mac team, photographed by Norman Seeff | TUAW - The Unofficia...
[pic] Funny Bill Gates pics from 1983 - Neowin Forums
Hiding messages in VoIP packets
BIND 9 Resolver crashes after logging an error in query.c | Internet Systems Con...
How to Monitor and Log Network Traffic on Linux Using vnStat
NicTool - Enterprise DNS Management
Speeding up Android development with Android-x86 and VirtualBox | Bruno Talks Te...
How To Rip DVDs with VLC - How-To Geek
Download Details - Microsoft Download Center - Group Policy Management Console w...
Hughski - ColorHug
Demystifying SQL server memory concepts video - Microsoft SQL Server Tips & Tric...
rsync backup for Android - Android Market
Packet Sniffing Basics | Linux Journal
A faster Web server: ripping out Apache for Nginx
Intel Museum – The Intel 4004
myvirtualcloud.net » VMware View 4.6 PCoIP Software Gateway (PSG)
Linux Logical Volume Manager Walkthrough – Stephen Foskett, Pack Rat
Random Stuff: Import virtual appliance without vSphere client
quickly deploy a sample virtual appliance to my ESXi server with the following command: ovftool /path/to/test.ova vi://root@esxi.lan
Straighten up with a new UBER tool : Presenting UBERAlign | Nickapedia
The Machine SID Duplication Myth (and Why Sysprep Matters) - Mark"s Blog - Site ...
Lotus Notes and Domino wiki
Using Horenso to Achieve 360-degree Communication | Karn G. Bulsuk: Full Speed A...
Visualizing Horenso to Ensure Effective Communication with Downloadable Visual W...
HO-REN-SO: The Communication Edge of Japanese Companies | Sun.Star
Home - GitHub
ISC Diary | Stuff I Learned Scripting - Evaluating a Remote SSL Certificate
Great Ways to Improve Your Resume Today | Wise Bread
Seth"s Blog: What good interview questions are actually trying to discover
How Many Sorting Algorithms Do Beginners Need To Learn - Computer Science Teache...
Create DNS Entries From a File - Kirk Evans Blog - Site Home - MSDN Blogs
Performance issue when printing Word Templates - Dynamics GP Support and Service...
Consumerisation of IT in education: Be prepared… - FE blog - Site Home - MSDN Bl...
Want Your Presentation to Rock? Hook Your Audience Early! - Canadian Developer C...
Tech Career Coaches: 4 Rules for a 4 Hour Work Day
The dirty secret of email is that the more you respond – the more you get.
Automatic backups, one per day, and with different backup file names - Microsoft...
Large Network Packet Size and Memory Pressure in SQL Server - Sakthi"s SQL Serve...
3 Keys to Agile Results - J.D. Meier"s Blog - Site Home - MSDN Blogs
PowerShell script to remove all users from a SharePoint Group - SharePoint Escal...
PowerShell script to list all User Profiles in an SSP - SharePoint Escalation Te...
Issues with PHS300 and Cisco VPN : EVDOforums.com
setup port 500 for special application firewall unblock.
Budget Tip: Survival Mode Produce List
Why Does My Linux VM’s Virtual NIC Show Up As eth1? - The Lone Sysadmin
ODIN - Open Disk Imager for Windows
VMware ThinApp Bootcamp Note – ThinApp Implementation Best Practices « The Virtu...
GNU Screen For Fun and Profit - The Lone Sysadmin
SSH Escape Sequences (aka Kill Dead SSH Sessions) - The Lone Sysadmin
Cronopete
Tools to monitor DNS - Windows Server - Technology
1. Dnslint /ql autocreate
Lightning :: Add-ons for Thunderbird
http://stallman.org/extra/personal.html
Migrating printers from W2K3 32-bit to W2K3 64-bit « Salt * Wet * Bytes
Migrate print servers
To migrate print servers by using a command prompt
wormtrack - Detection of scanning worms, and machine scans - Google Project Host...
Syndicate Press – a wordpress plugin for RSS feeds | henryranch.net
TCP/IP Reset -- Microsoft Certified Professional Magazine Online
netsh interface ip reset logfile_name
5 Cool PowerShell Cmdlets for Speeding Up Active Directory Tasks -- Microsoft Ce...
Get-ADGroupMember New-ADComputer Remove-ADUser Set-ADAccountPassword Unlock-ADAccount
How To Use etckeeper
Router/Bridge Firewall Linux
SSHGuard - Defend from brute force attacks
We"ll be back shortly
FREE Wireless WiFi Site Survey Software for MAC OS X
Linux News: Community: What Open Source Can Learn From Steve Jobs, Part 2
Linux News: Community: What Open Source Can Learn From Steve Jobs, Part 1
Four Hidden Tools in Scribus | Linux Journal
man make: a Primer on the Make Utility | Linux Journal
Dennis Ritchie"s legacy of elegantly useful tools - O"Reilly Radar
A Cartography of the Anthropocene
Technical Details for Our IPv6 Deployment : Comcast Voices | The Official Comcas...
CommandLineFu: Amazing Collection Of Command Line Gems [Linux & Mac]
Supercharge WordPress, Part 1 | Wazi
Take Any College Class for Free: 236 Open Courseware Collections, Podcasts, and ...
DailyTech - "Devil Robber" Trojan Infects Macs, Leeches Their GPUs for Bitcoin P...
How can I add a printer from the command line?
server
Installing and Managing Group Policy Preferences on a Windows Server 2003 Domain...
RMacD.com :: Pd-extended and random-data streams
Powershell login script to map network drives, printers and applicaton settings ...
$result = get-groupMembership $strName “Head Office” if ($result -eq ’1′) { $(New-Object -ComObject WScript.Network).RemoveNetworkDrive(“G:”); $(New-Object -ComObject WScript.Network).MapNetworkDrive(“G:”, “\\SERVER\general”); }
Last In - First Out: Cargo Cult System Administration
Intro to Automating System Administration with Cfengine 3 | Linux Magazine
Automating Security with GNU cfengine | Linux Journal
ORATECH_blog
ARE - Wiki - Honeynet Project Redmine
Steve Jobs And His Last Words : The Two-Way : NPR
Visual Studio Roadmap - Microsoft Visual Studio
» 5 Negotiating Tips You Can Use Almost Anywhere
Lancope NetFlow, sFlow-based Security, Network, Application Performance Monitori...
Bundlr - Bundle and share web content easily
3 Ways To Open Applications & Windows Maximized With VB Script [Windows]
How To Control WordPress Versions Using Subversion [Linux]
What is SIP Trunking
ISC Diary | Internet Storm Center Diary 2011-10-28
You might find out that users come with three levels of security clue:
Seth"s Blog: How to get a job with a small company
Preparing a Hard Drive for Sale on eBay | Mon 31 Oct 2011 | Blog | CodeStore
SANS: Security Awareness Training
Welcome to OpenMAMA | OpenMAMA
GoAccess - Visual apache/Nginx log analyzer | Ubuntu Geek
virt-resize - Resize a virtual machine disk
virt-alignment-scan - Check alignment of virtual machine partitions
How To Configure A pfSense 2.0 Cluster Using CARP | HowtoForge - Linux Howtos an...
Halloween Tech: Spooky and Odd Terms From Webopedia.com
BYOD: The inevitable reality | ZDNet
The answer to the BYOD question is Virtualization. | ZDNet
OutlookAttachView - View/Extract/Save Outlook Attachment
Conflux Groupware - Enterprise collaboration management
SpeakGoodChinese
Pioneers
LGames - Linux Games
lxdvdrip / Wiki / Home
Cheix USB
Home
My Top 14 Wordpress Plugins For Niche Sites
Automatic CentOS 6.0 Installation With Kickstart | Wazi
Notepad++ Home
A Sister’s Eulogy for Steve Jobs - NYTimes.com
Syncstarter | time synchronous digital playback
MuLaViTo / Wiki / Home
moneyGuru
Netrek Nexus
Software Testing Tools | Automation Testing | Regression Testing | Load Testing ...
Deskolo project
The story behind Steve Jobs’ Mercedez Benz and its missing license plate | Edibl...
Apple Lossless Audio Codec
How Far Does Social Advertising Reach? [Infographic] by Flowtown | Search Engine...
http://www.thc.org/thc-ssl-dos/
RealWorld Graphics - software for icon, cursor, image, and photo editing
VMware: VMware Support Insider: New File SR Page Now Fully Live
Organizing For Success - Chuck"s Blog
Six Essential Drupal Modules for Business | Wazi
The secret payload of the iPhone 4S: Bluetooth 4.0 — Apple News, Tips and Review...
Apple Posts Steve Jobs Memorial Video [News]
Dead People Server - Dead Celebrities, Dead People and Other Interesting Passing...
In defense of netbooks
Remember Netbooks? No One Else Does, Either
wissel.net :: Moving a NSF from one server to another
John McCarthy
BBC News - Artificial intelligence community mourns John McCarthy
Decoupling by Example
The Founding of Virgin Atlantic - Business Opportunities Weblog
Don"t Be The Boss--Be The Leader | Wise Bread
Creator Of Lisp, John McCarthy, Dead At 84 | TechCrunch
LinuxLive USB Creator
Public Knowledge | Fighting for your digital rights in Washington.
Jon Moon, "Clarity and impact" :: My book
How to Get Rich on Bitcoin, By a System Administrator Who"s Secretly Growing The...
Xrandr: Solve Screen Resolution Issues via command line in Ubuntu / Debian | Lin...
Have you met  ? Say hello to my BOM
Homemade DTV Antenna
Windows 8: Windows 8 BluePoison official download page: Windows 8 downloader / s...
The Basics Of Computer Programming 101 – Variables And DataTypes
ProxSMTP
CSS: Cameron Simpson"s Scripts
CIOs must "re-imagine IT"
Martin Mares: Linux Projects
Help your organization avoid the pitfalls of BYOD — Mobile Technology News
How to: Script for clearing the run history: - Solve your Identity crisis withou...
Dennis Ritchie, creator of C programming language, passes away - Building games ...
20 Essential PC Shortcuts - The blog of Rob Margel - Windows Help - Site Home - ...
Your SQL Server Setup may hang forever when it’s almost at the 99 %! - Microsoft...
PowerShell one-liner to determine the incoming e-mail drop folder in SharePoint ...
Dennis Ritchie: The Shoulders Steve Jobs Stood On | Wired Enterprise | Wired.com
Cargo Cult System Administration - The Lone Sysadmin
Basics of EDI | The Integration Engineer
The Wirecutter | A List of the Best Gadgets
I, Cringely » Blog Archive » The Steve Jobs Interview - Cringely on technology
I, Cringely » Blog Archive » Remembering Dennis Ritchie - Cringely on technology
Open Source Routing
Quagga Software Routing Suite
Steve Jobs was initially opposed to apps, new biography reveals -- Engadget
How to Change the IP Range for the Internet Connection Sharing DHCP service
Unboxing the Pantech UML290 4G USB Modem ~ Verizon Wireless
www.pagey.info: Using Pantech UML290 on Ubuntu Linux 11.04 (Natty Narwhal)
Without Dennis Ritchie, there would be no Jobs | ZDNet
News | Shinken
Steve reportedly worked on Apple"s next product until his last day | TUAW - The ...
a6omcl2la0ivlxsn3o8m.jpg (JPEG Image, 3800x2300 pixels) - Scaled (29%)
Flowchart for Scifi books, what isnt to like.
VPN Case Study Site
Setting up dd-Wrt, Public Sub-Net Over Dynamic WAN
Guy Kawasaki on what he learned from Steve Jobs | TUAW - The Unofficial Apple We...
On photographing Steve Jobs | TUAW - The Unofficial Apple Weblog
NXLOG Community Edition | NXLOG Community Edition
Wmatrix corpus analysis and comparison tool
About: OpenNode
check_hpasm – ConSol* Labs
Some useful commands in PowerShell - Kunal Mukherjee - Site Home - MSDN Blogs
sinkhole
Whitehats.ca Home
Sneaky salarymen scheme, skim and hide cash from their wives ‹ Japan Today: Japa...
Conference or Course? Where Should I Spend my Training Budget? - Canadian Develo...
Môsieur Ritchie - Devosaure - Site Home - MSDN Blogs
How to Polish a Pair of Men"s Dress Shoes
How To Automate Telnet Commands Using VB Script
ISC Diary | Dennis M. Ritchie (1941 - 2011)
Dennis Ritchie, Father of C and Co-Developer of Unix, Dies | Wired Enterprise | ...
Using PowerShell to clean up SharePoint document library files with no versions ...
Use MySQL Replication Like an Expert to Improve Performance and Enhance Availabi...
RIP Dennis Ritchie | Linux Journal
Handling setuid and setgid Programs
SAP Community Network Forums: Urgent!! Printing Barcode using ...
Bar Code Primer - Introduction to Barcoding - Worth Data USA
Understanding-Barcodes.pdf
Rats Causes Virgin Broadband Outage In Scotland | eWEEK Europe UK
liftoff/GateOne - GitHub
Linking in ebooks: How much is too much? - O"Reilly Radar
Data in the HR department - O"Reilly Radar
Remembering Dennis Ritchie, Creator of the C Programming Language and UNIX Co-Cr...
"Open Source Powering Pretty Much Everything"
virtuallyGhetto: Automating ESXi 5.x Kickstart Tips & Tricks
Download Details - Microsoft Download Center - System Update Readiness Tool for ...
Internet Explorer Command-Line Options
How to make a bootable VMware vSphere 5 USB installation media | satheesh.net
Authenticating Wi-Fi Users with FreeRADIUS | Wazi
Seth"s Blog: The atomic method of creating a Powerpoint presentation
How To Set Up & Use Windows 7 Backup & Restore Feature
SFTP Access To Amazon EC2 Using FileZilla | Wed 12 Oct 2011 | Blog | CodeStore
Adweek calls Jobs the "greatest marketer of the age" | TUAW - The Unofficial App...
VMware KB article – Large Environments 200+ hosts, 2000+ VMs « The Virtual Headl...
SSH scripts: prompt for passphrase if needed
How can I get a list of installed SQL Server instances? - Jay"s notes on SQL - S...
Is The Performance Of All Cloud Servers The Same? | The Storage Architect
TidBITS Opinion: Steve Jobs: Among the Crazy Ones
TidBITS Opinion: Steve Jobs: Sharing the Joy
TidBITS Opinion: Mourning Steve Jobs
TidBITS Opinion: Steve Jobs: Bringing Technology to the Masses
Apple holding private event on October 19 celebrating the life of Steve Jobs | T...
Official cause of death for Steve Jobs released | TUAW - The Unofficial Apple We...
"Mythbusters" Savage & Hyneman to host Steve Jobs retrospective on Discovery...
WiiCan in Launchpad
wiimotepresenter - jasonlpsmith
LooseBolts
Disable Caps Lock :: Useful Stuff :: JohnHaller.com
Fix: VMware vSphere Client – Error 1406. Could not write value | TechHead.co.uk
Startup Repair - Windows 7 features - Microsoft Windows
The Man Who Inspired Jobs - Business Opportunities Weblog
Tip: Want to be more productive? Don’t file your email | Productivity
practice
Steve Jobs and the Little Blue Box: How Ron Rosenbaum’s 1971 article about phone...
The article that inspired Steve Jobs: “Secrets of the Little Blue Box” - Slate M...
Cronopete
BasicTutorial - sigil - A Basic Sigil Tutorial - A WYSIWYG ebook editor. - Googl...
marcelo-soares/ConvertePST - GitHub
Uncrustify - Source Code Beautifier for C-like languages
Steve Jobs banner in the Windy City a nice tribute | TUAW - The Unofficial Apple...
wissel.net :: Omnisopie - mankind according to Dueck
Omnisophie
Poster: The Eight Levels of Vendor Acceptance — My Etherealmind
Top 10 Tactics for Diagnosing and Fixing Your Sick Technology
How to Ask for a Raise in a Bad Job Market
Computers In Class Another Legacy Of Steve Jobs : NPR
Reader Story: How to Buy a Car at Auction
The Staggering Achievement of Steve Jobs (AAPL, DELL, MSFT, T)
en:start [FusionDirectory Website]
mysqldiff -- a utility for comparing MySQL database structures
Static Free Software Home Page
Codemetre
AFFLIB » tcpflow — A TCP Flow Recorder
Steve Jobs, Whose Imagination Invited Us To Play : NPR
Hacker News
How much did Steve Jobs Mean To the Tech Industry? - Steve Rowe"s Blog - Site Ho...
Insanely great - Fabulous Adventures In Coding - Site Home - MSDN Blogs
Recordings from the First PowerShell Deep Dive - Windows PowerShell Blog - Site ...
Getting Remote Event Logs - Lessons Learned - Site Home - MSDN Blogs
The Secrets of PowerShell - MSDN UK Team blog - Site Home - MSDN Blogs
Steve Jobs - Buggin" My Life Away - Site Home - MSDN Blogs
Steve Jobs on business, life and health - HealthBlog - Site Home - MSDN Blogs
Smolt
CAElinux
Network booting with Linux - PXE
PureDarwin
Troubleshooting for Services issue on Windows 2008 R2
Hands On with Storage Spaces in Windows Server 8 « Tim Anderson’s ITWriting
I, Cringely » Blog Archive » Unanswered Steve Jobs questions - Cringely on techn...
Jon Stewart and Stephen Colbert pay tribute to Steve Jobs | TUAW - The Unofficia...
deauthentication [Aircrack-ng]
Apple CEO Tim Cook"s email to employees about Steve Jobs" death
The Tao of Steve — Tech News and Analysis
Video: Everything you wanted to know about DC motors - Hack a Day
I, Cringely » Blog Archive » Steve Jobs - Cringely on technology
Enterprise Cloud Computing | CloudSwitch
How To Set Up Your FreeNAS Server To Access Your Files From Anywhere
If an apple falls off a tree in a forest… | The Integration Engineer
Rotate a Banner Image with perl and PHP | The Integration Engineer
Use Profiling to Improve Snort Performance | Wazi
Increased Performance In Linux With zRam (Virtual Swap Compressed in RAM) ~ Web ...
Steve Jobs: A genius departs | The Economist
Doc Searls Weblog · The journey was the reward
Here"s to the crazy ones: a farewell to Steve Jobs | TUAW - The Unofficial Apple...
F. Dyson"s suggested approach to proving the Riemann Hypothesis (using quasi-cry...
Japanese Lessons with Maggie
Expressing Apologies
山伏修行体験塾
Japanland Homepage
Index of /programs/tsdecrypt
kernel.org status: hints on how to check your machine for intrusion [LWN.net]
IT inferno: The nine circles of IT hell
At NYC"s Chelsea Hotel, The End Of An Artistic Era? : NPR
Culture at Work: Table of Contents
Life Quotes - Sources of Insight
Good one by G.B. Shaw
Requisition vs. Planning worksheet: why having two planning tools? - Microsoft D...
svn2git in Svn2Git - Gitorious
Plan Your Career Like You Would a Four-Phase Project
How to Put Your Home Maintenance on Auto-Pilot and Keep Your Pad from Turning in...
PC"s Telecom Blog
Telecom and IT Blog for Admins and Users
Enabling Consumerization of IT - Viewpoints - Site Home - MSDN Blogs
Preparing for Consumerization of IT - Viewpoints - Site Home - MSDN Blogs
GoldenPod
Gabedit : A graphical user interface to computational chemistry packages
SourceForge.net: vbuilder
Heliostat Projects - CerebralMeltdown.com
leaflabs.com
Digital Detective - Dcode v4.02a Freeware
Dcode v4.02a Freeware
virtuallyGhetto: How to Automate the disabling of the VAAI UNMAP primitve in ESX...
VMware KB Article – Increasing the maximum number of ports designated for an ESX...
Virtu-Al | Virtually everything is poshable
Managing Digital Information Overload – Is Technology The Cause & The Cure? [Opi...
Fire hydrant graphic
Downloads - Adiscon LogAnalyzer
OpenCards
Elastix :: Open Source Unified Communications Server
Movie creator from photos and video clips
IT ratchets up social-media involvement - Computerworld
The eDiscovery Paradigm Shift: Evolving from eDiscovery to Information Governanc...
Cisco security GM: Consumerization drives everything — Tech News and Analysis
Learn Python The Hard Way | A Beginner Programming Book
arXiv.org e-Print archive
VMware KB: Installing async drivers on ESXi 5.0
Wifi Routers Eat Babies! | Flickr - Photo Sharing!
Jack of all Clouds :: Guy Rosen on Cloud Computing
Ultimate VMWare ESX Whitebox
Access Junkie
Windows Metro Style Apps Developer Downloads
Genii Software | BlogNew
wissel.net :: The 3 P of Performance: Passion, Professionalism and Persistence
The 3 P of Performance: Passion, Professionalism and Persistence
ArcAttack! - Musical Tesla Coil / Singing Tesla Coil Home
Visualization of the Week: The classroom seating chart - O"Reilly Radar
The four strangest bugs and bungles in the history of Android | ExtremeTech
PHP-FPM/Nginx Security In Shared Hosting Environments (Debian/Ubuntu) | HowtoFor...
Database Buying Guide: Open Source Databases — DatabaseJournal.com
Easily Turn Off LCDs With a Shortcut Key in Ubuntu - Softpedia
Red Hat engineer renews attack on Windows 8-certified secure boot • The Register
Five Quick digiKam Tricks « Scribbles and Snaps
Linus Torvalds’s Lessons on Software Development M... - Input Output
Silverlight Issues
20 Myths of Wi-Fi Interference  [RF Solutions] - Cisco Systems
Myth #9: "I"ll hire a consultant to solve any interference problems I run into."
IT Drivers for the Cloud - J.D. Meier"s Blog - Site Home - MSDN Blogs
Early Windows 8 Resources to sift through - UK ISV Developer Evangelism Team - S...
A Few Million Monkeys Randomly Recreate Shakespeare | Jesse Anderson
SQL Server’s utterly pointless event logging « The Angry Technician
Using Power Shell to script out Replication - REPLTalk covers Using and Tuning S...
VMware ESXi 4 vs ESXi 5 Log File Locations | vNinja.net
Virtu-Al | Virtually everything is poshable
VMware KB: Installing ESXi 5.0 best practices
Certification Resources
New Malware Hides from Antivirus in Your BIOS [News] | MakeUseOf
Is System Administration a people-oriented career? « UNIX Administratosphere
ThinkUp: Social Media Insights Platform
PowerShell for SQL - Getting Started - Cindy Gross - Troubleshooting, tips, and ...
PowerShell for SQL Server - Basics - Cindy Gross - Troubleshooting, tips, and ge...
SQL PowerShell Demo - Intro - Cindy Gross - Troubleshooting, tips, and general a...
25 Frugal Items for Your Organic Vegan Grocery List | Wise Bread
Beehive scale build details. finally « Fighting with technology
/dev/ttyS0 » Blog Archive » Modifying The DD-WRT GUI
Beginner Concepts: A quartet of videos on Inductors - Hack a Day
check_updates – nagios_plugins
betterFORM limeGreen: XForms Dojo Framework - index.xhtml
gscan2pdf-1.0.0
bareFTP project home
dxirc
BlackHole - opensource data deduplication software with mirroring and snapshots
Become an ImageMagick Ninja: Doing Things in Batches | Wazi
Blessed be the Org, the Com, and the Net - Stallmanism
Federal Register
Unity Books Lens in Launchpad
http://www.mattcaron.net/linux/scripts/sync_podcasts
Hurricane Tracker - weather.com
Free as in sake: The story of Koji | opensource.com
The Simple Dollar » Review: What Got You Here Won’t Get You There
Nimbus
ebtables – Linux Ethernet bridge firewalling
CIO PeerGroup Minutes
9 Awesome SSH Tricks
NetbootCD
Building a NAS Server - Super User Blog
OpenIndiana
Mac 101: Format choices for USB flash drives | TUAW - The Unofficial Apple Weblo...
Recover Hostage Media From Your iPod with iPodDisk
ipoddisk - iPodDisk is a tool designed to make it easy and intuitive to copy mus...
Why are the building numbers on Microsoft main campus so erratic? - The Old New ...
New spam sources in the making - Securelist
Pax Britannica
WakeMeOnLan - Turn on computers on your network with Wake-on-LAN packet
iEMU Project- Run iOS on Android synonymous hardware platform | GooGeZ
App Hub - soundlab
Appx Powershell Cmdlets - Looking For The Spike... - Site Home - MSDN Blogs
Windows Azure PowerShell Cmdlets 2.0 have been released! - Michael Washam - Tech...
Useful SQL PowerShell scripts - SharePoint Infrastructure....From the field - Si...
PowerShell–THE best way to manage Live@edu - UK Live@edu Blog - Site Home - MSDN...
Download Free Password Recovery Software Tools
FTP and LDAP - Part 2: How to Set Up an Active Directory Lightweight Directory S...
FTP and LDAP - Part 1: How to Use Managed Code (C#) to Create an FTP Authenticat...
Improving Visual Studio Performance - bharry"s WebLog - Site Home - MSDN Blogs
PowerShell script to create a new User Profile Property - SharePoint Gen - Site ...
Extensions@Frieger.com
OpenTeacher - The easiest way to learn a new language
ViewGit - a git repository browser
Tsung - Open-source multi-protocol distributed load testing tool | Ubuntu Geek
Tsung
0 A.D. :: Wildfire Games
The New Domino Admin » Blog Archive » Lotus Domino: Blue Screen of Death (STOP 0...
Unlogic.se - OpenIcons
sali
Conquests
Web Server for CDROM and USB- cross-platform webserver for running PHP, Perl, Py...
National Radio Quiet Zone
Nerdy Day Trips
Telecomix Crypto Munitions Bureau
Run Linux on your Dockstar, GoFlex, or Pogoplug NAS
Building a Svartkast with a pretty pink Pogoplug: Cheap hardware to leave on som...
http://www.ne.jp/asahi/nhc/itfj/03-level-engl20090514.htm
OpenProj - Project Management | Download OpenProj - Project Management software ...
FARK.com status page
FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Techn...
Apache2: How To Redirect Users To Mobile Or Normal Web Site Based On Device Usin...
FinanceProfessor.com: The World"s Greatest Money Maker: Warren Buffett - BBC Doc...
MATRIX: The Center for Humane, Arts, Letters and Social Sciences Online
eScholarship: Archaeology 2.0: New Approaches to Communication and Collaboration
Sync Mail Dir
eDiscovery Daily Blog: eDiscovery Trends: Your Chance to Comment on Code of Cond...
Using PowerShell to collect information for Storage Troubleshooting (Part 2: Per...
Bulk Backup and Restore at the tip of your finger - Developer hearted / Relation...
LiCo - The New Linux Counter Project
Ci Eye - GitHub
Employees Can"t Be Fired for Facebook Complaints, Judge Says - Forbes
NeapTide » fdupe
Michael Hart (1947 - 2011): Prophet of Abundance - Open Enterprise
nsftools.com - The September 2011 Blog
Phenoelit
THC-AMAP - fast and reliable application fingerprint mapper
Testing Your HP Fax Machine with the HP Fax Test Service HP Officejet Pro L7580 ...
How many ways can you slice a URL and name the pieces? - Tantek
. : a n a k r e o n . g a m e . d e v e l o p e r s : .
Michael S. Hart - Gutenberg
DPG for X (dpg4x) | Download DPG for X (dpg4x) software for free at SourceForge....
The New Domino Admin » Blog Archive » BlackBerry Enterprise Server 5.0.3: No Mor...
New World Record: 1,000,000 IOps from vSphere 5 - Virtual Geek
Main Page - iEmu
Symkat - SSH: Tips And Tricks You Need
Math Primer Series: Matrices I: Introduction and Basics Operations - Reza Nourai...
HP TouchPad Setup Guide Part 1: Speed Up Your Tablet With Preware, Homebrew & Pa...
A Fistful of Dongles: Employee Infosec Academy
Showing impossible to understand Javascript: Obfuscated Quine « OiMae Blog
Internet Security: Top Ten Most Influential Programming Books of All Time
Weak typing - the lost art of the keyboard
ISC Diary | Logs - The Foundation of Good Security Monitoring
Renaming the sa Account
Opa: Advancing web development to the next generation
Brazilian Trojans beyond borders - Securelist
SQL Server Page Compression became default for SAP - Running SAP Applications on...
Protecting yourself from spear phishing - Terry Zink"s Cyber Security Blog - Sit...
Improving our file management basics: copy, move, rename, and delete - Building ...
Free Chemistry Add-In For MS Word - Sam Stokes on Research in your life and stud...
August Update from Microsoft Research & Faculty Connection - Microsoft UK Facult...
Create an IIS configuration backup - benjamin perkins - Site Home - MSDN Blogs
Action Guidelines - J.D. Meier"s Blog - Site Home - MSDN Blogs
The Way of Success - J.D. Meier"s Blog - Site Home - MSDN Blogs
The Consumerisation of IT in the Enterprise: A View From the Field - Microsoft A...
Project Server 2010: Timesheets - Where do Personal Tasks come from? - Brian Smi...
Stop and checked your Virtual Log Files (VLFs) - REPLTalk covers Using and Tunin...
A Useful Tool to generate dump file for a particular service - AsiaTech: Microso...
25 Strategies for Getting Results - J.D. Meier"s Blog - Site Home - MSDN Blogs
Making the Most of Consumer IT - Viewpoints - Site Home - MSDN Blogs
Check file versions for IIS in Windows Server 2003 - Notes from a dark corner - ...
Back from a few days off, and a batch file would not work - OneNote Testing - Si...
Data can be saved from your water-soaked computer
Next to cyberattacks, well-meaning insiders pose greatest security risk
MiTeC Homepage
The evolution of the web
repocafe - self-service for svn hosting
Pro Git - Table of Contents
Sonar
IBM Troubleshooting Internet HTML e-mails with images appearing as red Xs - Unit...
The dreaded red x"s
MaximumHoyt: Fixing a Buggy ACPI BIOS
Meld : Home Page
GOSCON
Free60
vnedvac.pdf (application/pdf Object)
Oral history interview with J. Presper Eckert OH 13
Battle of the SATA 3.0 Controllers: Introduction - Techgage
Stick with AMD and Intel
Simple Rules For Partnering With Another Business (Andrew"s Blog 09/01/2011)
Makagiga / Download - To-do manager, notepad, RSS reader...
queXF | An Open Source, web based paper form verification and data entry system
myBill Project Site | Main / HomePage
I, Librarian - PDF manager for scientific articles
Open Source Articles, Tutorials and Licensing Information Wazi
Generating Web Charts with Gnuplot and Web Scripting | Wazi
How to use Conky for automatic system notification and administration | TechRepu...
Jeff Tranberry"s Digital Imaging Crawlspace
A Scoop of DNG With Your PIE | Lightroom Secrets
Feed Validator for Atom and RSS
Blogging is futile
ebook2cw - convert ebooks to Morse MP3s / OGGs
CloudStack | Open Source Cloud Computing
How to Setup and Use Github in Ubuntu | Ubuntu Manual
Downloads - slowhttptest - Slow HTTP DoS vulnerability test tool - Google Projec...
In Search Of The Missing IT Gene - Chuck"s Blog
BASIC programming on an Arduino - Hack a Day
Cisco IOS Hints and Tricks: BGP next hop processing
Deduplication Defense Dodges Sanctions « e-Discovery Team
Anki - friendly, intelligent flashcards
Why Amazon Can"t Make A Kindle In the USA - Forbes
With IT leadership, the "how" is as important as the "what" - O"Reilly Radar
» Linuxaria – Everything about GNU/Linux and Open source Enable automatic securi...
The Web Proxy Autodiscovery Protocol | Linux Journal
How-To: Release Stuck NFS Mounts without a Reboot | Linux Journal
cms-explorer - CMS Explorer - Discover the CMS components behind the site - Goog...
Convirture Products: Open Source
Tech Comics: "Mini Geeks" - Datamation
Deltasql wiki
check_mysql_health – ConSol* Labs
eSepak module for Asterisk PBX
Flite module for Asterisk PBX
SLEEPWORKER - no time to sleep
dupeGuru - Duplicate file scanner
Circuit Diagram - A Circuit Diagram Maker
NetHogs: What program is using that bandwidth?
HP-UX Logical Volume Manager (LVM)
HP/UX system administration
Useful SAN Commands | SAN Storage Commands | SanDuel.com
CH2M HILL - Home
Borges: Garden of Forking Paths - Author Homepage
Touch Droid
iConnect
The MIT Radio Society » The Flea at MIT
GE’s World War II Era “Copper Man” Gets His Due | GE Reports
A Fistful of Dongles: Advanced Persistent Threat
The eDiscovery Paradigm Shift: The Post Autonomy World
Addressing the Regulatory and eDiscovery Challenges of Social Media | e-discover...
Dirty Rotten Thieves Stealing Your Wifi? Find Out What They’re Looking At With T...
Micro-communities: Consume Better Content Faster! at #sxsw (voting time) | IdoNo...
Renovation - Home
eFanzines.com - The Drink Tank
Basic Home Networking, Part 3, File and Printer Sharing
Powershell Script Template & Out Line Logging Function to help get you started -...
Pan Historia Community for Collaborative Writing, Interactive Fiction & Role Pla...
DailyTech - .NET Framework "1935 Error" Cripples Some Users" Office, IE9 Install...
14-16 hours on this "project", including a wasted weekend day, between digging around online and implementing the suggestions.
Blackbuntu Linux | Penetration Testing Distribution
Main Page - WebOS Internals
Preware
WSUS Helper
Who"s Your "Ideal Average" Client
TZWorks LLC Prototype Downloads for Forensic tools
The Secret of the Fibonacci Sequence in Trees
Creating a Centralized Syslog Server | Linux Journal
14 Year Old Social Media Guru - Business Opportunities Weblog
The mind-mapping.org Blog » This blog is about software for mindmapping and orga...
TreeSheets
Freeplane - free mind mapping and knowledge management software
LinuxCon North America 2011 | Overview | Linux Foundation Events
Metalogic: Finance Explorer
Concert Photography Tips
ISC Diary | Putting all of Your Eggs in One Basket - or How NOT to do Layoffs
Copy and Paste is not working on my Remote Desktop Connection… what’s wrong?
Diagnose and fix program installing and uninstalling problems automatically - Th...
Making A Case For Cloud: Perspectives From An IT Practitioner - Chuck"s Blog
For me, the whole cloud and IT transformation discussion has evolved to 10% technology, and 90% organizational mindset change.
Free Online Course Materials | MIT OpenCourseWare
OpenLearn - The Open University
TuDu, a tool to control your "to do" lists
#LinuxCon : Sessions You Don"t Want to Miss - InternetNews.
PLUG - Home
DerbyCon : Louisville, Kentucky – September 30th to October 2nd, 2011
Missie Krissie: Free Letter JPGs!
taidye.original: {printables}
*The Graphics Fairy*
Feed Your Soul: the free art project
EDD Update: Maryland Decision Raises New Cell Phone Issues
New eDiscovery Rules on the Horizon? | e-discovery 2.0
EDD Blog Online: The case for compliance as a cloud service
The History of ILTA | E-Discovery Resources & Information - DiscoveryResources.o...
The eDiscovery Paradigm Shift: Global 2000 Poll Results on Information Governanc...
Building Vagrant boxes with veewee | MDLog:/sysadmin
Telex: Anticensorship in the Network Infrastructure
Doug"s Oracle Blog
virtuallyGhetto: Automating the Search for Lopsided Bootbanks in ESXi 4.x
Windows Anti-Virus Exclusion List - TechNet Articles - Home - TechNet Wiki
Basic Home Networking - Part 2, wireless setup
Basic Home Networking - routers and switches
virtuallyGhetto: How to Automate the Upgrade of Classic ESX 4.x to ESXi 5
WoodITWork.com » SRM for free with PowerCLI & DataONTAP– Part 1: NFS
A history of Motorola: From a warehouse in Chicago to Google"s arms
"E-Discovery Evolution": Costs of electronic discovery are growing
Jumper One » electronic projects, tutorials, hardware hacking...
For Key Employees" Bad Faith, Intentional Spoliation, Court Imposes Adverse Infe...
IT Department Takes on Critical Ediscovery Role - EnterpriseStorageForum.com
How to Eat Healthy on a Budget
Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud : How Secure Is Your...
email2trac
Tinyproxy - A light-weight HTTP/HTTPS proxy
Love-Crumbs
Racket
Gargoyle Router Management Utility
How To Check .Net Framework Version Installed
Blocking Unwanted Parasites with a Hosts File
How-To: Replace Your Brake Pads - Cobalt SS Network
Fetchmail - Request Tracker Wiki
Engadget"s back to school guide 2011: tablets -- Engadget
Free Software and homeschooling: reports from the trenches | Stop
BYOD to work but be prepared for remote wipes and legal holds, says Unisys - Com...
Real World Computing: Converting DVDs to Good Quality AVI Files - Part 2 (The Pr...
wissel.net :: Neurotic Leadership Programming
A non-technical guide to understanding and fixing TCP/IP problems on a network
Real World Computing: Converting DVDs to Good Quality AVI Files - Part 1 (The Wa...
FireCAT: Firefox Catalog of Auditing exTensions | The News
PDF Bates-Stamping Solutions
MANDIANT: Intelligent Information Security | MANDIANT Redline
MoonSols DumpIt goes mainstream ! | MoonSols
Cepheid Variable | Geeks and nerds since 1969
Consumerisation of IT in Education: Twitter Exchange - The UK Higher Education B...
Tim O’Reilly: The Future of Business Intelligence is Now - Viewpoints - Site Hom...
Managing Global IT Change at the Speed of Thought - Viewpoints - Site Home - MSD...
Using Nagios from an Android Phone « UNIX Administratosphere
standalone [Zotero Documentation]
3 Things You Should Know About Your Windows 7 Firewall
Faregeek - special discounted and cheap tickets to worldwide, asia, africa, midd...
Why silently dropping mail is a bad idea - Terry Zink"s Cyber Security Blog - Si...
ABData, Andy Brunner - POP3 Collect
8 Best CAD Apps for Linux | Tech Drive-in
Business Plan Templates
Data Center Power Failure? | Michael McNamara
Cisco IOS Hints and Tricks: Building a Greenfield Data Center
The Signal Path » Frequency Generation: Crystals and Ring Oscillators
Inventgeek.com - Ultrasonic Aeroponic Seedling System - Overview
PetaPixel
After Riots, U.K. Prime Minister Floats Social Media Crackdown - Peter Kafka - N...
UK riots: text of David Cameron"s address to Commons - Telegraph
Hack Windows passwords using the Linux application chntpw RollingProgrammer();
Doc Searls Weblog · Bruce Elving, professor of FM radio
Snorby - All About Simplicity
Increasing the JVM Heap Size | The Informix Zone
Kevin Kelly on how technology evolves | Video on TED.com
The Undeletable SafeBoot Key « Didier Stevens
Is Glark a Better Grep? | Linux.com
Supercharge Nagios with Plugins | Wazi
Use the Focal Length Analyzer Script with digiKam « Scribbles and Snaps
Postini Message Analyzer - Postini Help
Compliance Management Solution | Q-Pulse
Lightning strike zaps EC2 Ireland | ZDNet
The TSA Blog: Weird Science: Traveling With Homemade Gadgets
naked capitalism
ISC Diary | Ping is Bad (Sometimes)
virtuallyGhetto: How to Persist Configuration Changes in ESXi 4.x/5.x Part 1
Training a Next Generation Geek | dominoGuru.com
Great scooby doo graphic
Tails - Privacy for anyone anywhere
Configuring regional settings automatically - UK Live@edu Blog - Site Home - MSD...
Consumerisation of IT in Education - The UK Higher Education Blog - Site Home - ...
This Other Eden
Keynote Speakers | 25th European Conference on Object-Oriented Programming
Summer School Talks | 25th European Conference on Object-Oriented Programming
DIY cable to build better iOS exploits - Hackers - SC Magazine Australia - Secur...
15 Things Kurt Vonnegut Said Better Than Anyone Else Ever Has Or Will | Music | ...
Free Worldwide Travel Guides - Wikitravel
SCOTTEVEST Travel Clothing Designed to Carry the iPad - Best iPad Accessory - Ca...
HackerTarget.com : Online Security Scan | Internet Security Vulnerability Assess...
Forensic Methods | Computer Forensic Investigations
Consortium of Digital Forensic Specialists
Wifi Network Backup Manager Utility - Shai Raiten
Less known Solaris features: About crashes and cores - Appendix B: ::status - c0...
Installing SP1 and June CU for SharePoint 2010 and Office Web Apps - Anything IW...
Profile Migrator - Windows user profile migration software
Migrating iTunes Media Library and User Preferences to a New Computer | sepago
Osaka - Japan"s amazing water city ‹ Japan Today: Japan News and Discussion
US map shows which states trend toward iOS versus Android | TUAW - The Unofficia...
Internals of Database Snapshot - Blogs from Suhas - Site Home - MSDN Blogs
Consumerization of IT: Where"s the Win-Win? - Viewpoints - Site Home - MSDN Blog...
Inspirational Quotes - Sources of Insight
IT Reels as Consumer Tech Rocks the Enterprise - Viewpoints - Site Home - MSDN B...
Web Books Listed by Title - A
The World Wide Web project
A Victa-ry for mathematics - The Age Education Resource Centre
Milking It: 5 Easy Homemade Cheeses | Wise Bread
A Fistful of Dongles: Detective Cindy Murphy’s Cell Phone Evidence Extraction Pr...
Understanding the Immune Response to HIV - Microsoft Research Connections Blog -...
The CIO vs. the Marketing Technologist - Viewpoints - Site Home - MSDN Blogs
How To Create an Ebook with OpenOffice.org | Wazi
ACEDS - Association of Certified E-Discovery Specialists | ACEDS.org
eDiscovery 101
No Debt MBA
Boot Camp Software Update 3.1 for Windows 64 bit
Boot Camp Drivers Update 2.2 for Windows
World’s Top Selling Cars by Country - Business Opportunities Weblog
Free Customized Business Plans for Small Business and Entrepreneurs at Enloop.co...
FinanceProfessor.com: How to use the Fama French Model | Empirical Finance Blog
Resistor Necktie — DIY How-to from Make: Projects
Networking: Duplicating Drops in structured wiring « Your Warranty Is Void.com
OpenDNS Datacenter Monitoring Station « NerdKraft
‪How to gain electronic parts using a soldering pot‬‏ - YouTube
gerbv - A Free/Open Source Gerber Viewer
Repairing T40"s battery
How to take a travelling electronics lab on the road with you - Hack a Day
Legal Guide for Bloggers | Electronic Frontier Foundation
Becoming E-Discovery Ready – An Introduction to Litigation Software for E-Discov...
10 Tips For Taming OS X Lion
What Is Thermal Design Power? [Technology Explained]
Tips for VMworld US 2011 & Las Vegas — The Lone Sysadmin
FinanceProfessor.com: ‪Geoffrey West: The surprising math of cities and corporat...
virtuallyGhetto: vSphere 5 Summary on virtuallyGhetto
virtuallyGhetto: New vSphere Health Check 5.0 & ghettoVCB Script
Fly or Drive Calculator™
Hipmunk: Better Flight and Hotel Search
Silverlight Version - detect the version of your silverlight
E-Discovery Made Simple – Electronic Discovery 101
Bit by Bit: Building a Better eDiscovery Collection Solution | e-discovery 2.0
Google Plus defines an era of disruption at a moment"s notice - O"Reilly Radar
How Good is Your Email Deliverability? :: AWeber Knowledge Base
Line Addressing with sed
Tech Comics: "Graph Theory for Geeks" - Datamation
WASP: The Linux-powered flying spy drone that cracks Wi-Fi & GSM networks | Geek...
Mutabor — Mutabor
Multi Colored Rack Components
ClamXav
Script to Collect Hardware Inventory Data : Brian Desmond"s Blog
Haskell - HaskellWiki
Build Blazing Fast PHP Websites with Memcached Distributed Caching
metro e technical overview - Google Search
003 - Cited by 55 - Related articles Metro Ethernet S
Software Carpentry
Thruk Monitoring Webinterface
How To Install, Secure, And Automate AWStats (CentOS/RHEL) | HowtoForge - Linux ...
Get pretty much anything done by awesome people | TaskRabbit
virtuallyGhetto: New vSphere 5 CLI Utilities/Tricks Marketing Did Not Tell You A...
virtuallyGhetto: How to Automate Host Cache Configuration in ESXi 5
How to configure system failure and recovery options in Windows
Giovanni Vigna
Java Tester - Other Testers
Troubleshooting wireless mouse and keyboard issues
How to troubleshoot Bluetooth detection and connectivity problems in Windows XP ...
20 craziest job interview questions on Shine
CSV file editor, for Windows
Citrix Survey – Organizations Are Realizing Significant Benefits by Adopting “Br...
Vagrant - Welcome
http://connie.slackware.com/~vbatts/minimal/
Make A Fillable Form In Word 2010 & Collect Data The Easy Way
Cerowrt - Overview - Bufferbloat
BlackBerry Bold 9780 User Guide Manual Apps Tips Help Troubleshooting & Demo
Decoding Intel’s Laptop Processor List [Technology Explained]
VMware Scale Up vs. Scale Out: The Big Picture — The Lone Sysadmin
Estate Planning Essentials: Preparing for the Unpleasantly Possible
SELinux Module Building — Fedora Unity Project
SELinux Policy IDE (SLIDE) - Trac
Handmade Copper Jewelry, Copper Necklace, Copper Earrings, Unique Copper Jewelry
virtuallyGhetto: Host Profiles Free in ESXi 5?
SourceForge.net: Integrating iTop with Nagios - itop
virtuallyGhetto: New vSphere 5 CLI Utilities/Tricks Marketing Did Not Tell You A...
The Blog of Helios: Can You Teach Computer 101?
VMware Communities: VMware View™ Bootcamp
Software Protection Initiative - Lightweight Portable Security
LDAP ToolBox (LTB) - Self Service Password
Easy LDAP management | LDAP Account Manager
Inside the Asterisk » Blog Archive » The Evolution of Asterisk (or: How We Arriv...
~mbuffer/ - the home of the measuring buffer
Organizing From Silos To Services - Chuck"s Blog
Hack-A-Vision: Sniffing Passwords Over a Wifi Connection [BETA/Linux]
How To Run Your Own DNS Servers (Primary And Secondary) With ISPConfig 3 (Debian...
How to build your own 135TB RAID6 storage pod for $7,384 | ExtremeTech
JPC-2
Silent or unattended installation - Microsoft Dynamics NAV Team Blog - Site Home...
Kagen Schaefer
Pipe Organ desk
My Open Wallet: How (Not) to Get a Job: A Personal Finance Blog About Money and ...
The Unix revolution—thank you, Uncle Sam?
JSTOR
VPN Troubleshooting
Westell
Small Basic 1.0 is here! - Computer Science Teacher - Thoughts and Information f...
Opening minidumps in Visual Studio—what to do when you get a “You cannot debug a...
Debug Diagnostic Tool 1.2 released - Tips and tricks: ASP.NET, IIS and .NET deve...
UMA Technology : Overview
TimeIT time tracker in Launchpad
Google Effects on Memory: Cognitive Consequences of Having Information at Our Fi...
Data Center Class WAN Optimization | Silver Peak Systems, Inc.
Peter"s blog: It"s official: developers get better with age. And scarcer.
AnonPlus - The Anonymous Social Networking Site.
Tim Bunce / Devel-NYTProf - search.cpan.org
Modern Backup 2 — Customer-obsessed next generation backup, archiving, and disas...
Speed matters: how Ethernet went from 3Mbps to 100Gbps... and beyond
Greg"s Cable Map
Scheme Maker - Summary
HotelDruid: Hotel Management Software
Appliance Parts at RepairClinic. 125 Brands. 365 Day Returns.
Sales Tax Holidays
HMC5883L Compass Tutorial with Arduino Library - Tutorials - Love Electronics
Gs & LTEs: Understanding Mobile Broadband [Technology Explained]
AVG - AVG Rescue CD Guide
WoodITWork.com » Thinking, Building and Scripting Globally – a London VMUG prese...
Index of /rescue_cd
Kaspersky Rescue Disk 10 Download
The Systems Engineer » Blog Archive » Quick vSphere Powershell to see total vCen...
Rescuing a corrupt NTFS partition (and giving Linux an n-th chance) - Saving the...
How to slipstream SQL Server 2008 R2 and a SQL Server 2008 R2 Service Pack 1 (SP...
Network Dashboard
Inverse Path - Research
How to Make a Vase out of a Plastic Bottle: 8 steps (with video) - wikiHow
Diffuse
IT jobs: Winners and losers in the cloud era
How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History ...
Process Photos with digiKam’s Batch Queue Manager and a Bash Script « Scribbles ...
^txt2regex$
Damn Small Linux: Still Damn Fun
Welcome to the Useless Information Home Page!
popHealth - An Open Source Quality Measure Reference Implementation
Edward Tufte’s “Slopegraphs”
LMMS - Linux MultiMedia Studio
Troubleshooting Slow Disk I/O in SQL Server - Jay"s notes on SQL - Site Home - M...
/dev/ttyS0 » Blog Archive » Reverse Engineering VxWorks Firmware: WRT54Gv8
A rough guide to JVM languages - O"Reilly Radar
RFC 6244 - An Architecture for Network Management Using NETCONF and YANG
SecureCentos.com
TiVo Superstore | Upgraded TiVo DVRs, Remotes, Parts, Repairs
Daemon & its sequel, FreedomTM - by Daniel Suarez
Setting Up Automated ESXi Deployments | vNinja.net
SSL Certificates DigiCert Digital SSL Certificate Authority
Steve Gibson
YUMI - Multiboot USB Creator (Windows) | USB Pen Drive Linux
Laptop and a Rifle
Electronics tutorial two-fer: soldering skills and wires - Hack a Day
Cybercriminals switch from MBR to NTFS - Securelist
The Backup Blog: Inside Avamar: Global Client Deduplication
Archiving CDs to ISO from the commandline | Linux Journal
Stories of Linux: Interview with Ian Murdock on Debian"s Early Days | Linux.com
htmLawed, script / software to secure / sanitize / purify / filter HTML / XHTML ...
Android Community - Tracking the Android Platform
Linux on 4KB-sector disks: Practical advice
Advanced Format Drives with SmartAlign – The Digital Den
Uzebox - The ATMega Game Console
Astronomy Picture of the Day
DOLPHIN - SLED Schematic Link EDitor
CYPHERTITE
HP ProLiant MicroServer series -  Download drivers and software - HP Business Su...
Timeslot: Plan Your Day
A Geek Raised by Wolves
Jamal B"s Blog - Infosec Mindstorm
How to remove duplicate files without wasting time | TechRepublic
Cheap Domain Names Registration, Domain Transfer, SSL Certificates, Free DNS, Pr...
Free Music Archive
Main Page - DP
Monitor & Enforce Security Policies - Data Otaku - Site Home - MSDN Blogs
Stupid PSH Trick: Diffing Lists - Lessons Learned - Site Home - MSDN Blogs
Thinking about Regular Expressions and Console.Writeline - Secret Microsoft Comm...
NTFS And 4K Disks - Ntdebugging Blog - Site Home - MSDN Blogs
WorldWide Telescope
Building a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE ...
HP ProLiant MicroServer Owners Club! - Overclockers Australia Forums
Weekend Project: Create Virtual Hosts with Apache | Linux.com
Windows7 installation Error 0xc0000225 VirtualBox on Ubuntu Linux | NW Linux
How to Quit Your Job | Wise Bread
Command-line Photographic Workflow on Linux « Scribbles and Snaps
yEd - Graph Editor
http://axel.alioth.debian.org/
NCSU News :: NC State News and Information » Model Finds Optimal Fiber Optic Net...
Advice From An Old Programmer — Learn Python The Hard Way, 2nd Edition
Learn Python The Hard Way, 2nd Edition — Learn Python The Hard Way, 2nd Edition
PdfMasher
Growler Collar: Dries clear & amber growlers for craft beer from breweries, brew...
AJ-Services
AJ-Services » Blog Archive » Internet Storm Center Infocon Status in Nagios
Teravolt.org
Network Heresy
pronto - Robust Networking Architecture
Battery Reconditioner
Firmenporträt seat-1 Software GmbH - Hersteller des Open Source ERP IntarS
Gigalomania
PowerShell Script Switches Printer Configurations Between Sites | sepago
Backing up a Mirrored database using SQL Agent - SQL Server Agent Team Blog - Si...
Tips for reducing help desk calls when upgrading to Office 2010 - Education - Si...
Two different approaches to testing a server - OneNote Testing - Site Home - MSD...
PowerShell Diversion #4: Discussion - richmac - Site Home - MSDN Blogs
SQL Tip of the Day - Objects, Services, and the rants of a lunatic operating out...
SharePoint Health and Monitoring - A Primer (practical techniques from the field...
Why DTCTester always fails on windows Server 2008 Cluster even DTCPing test succ...
Smarter Government – The Hybrid Organisation in Practice (FREE Whitepaper) - Mic...
DC fails logons or experiences LDAP timeouts - Spat"s WebLog (Steve Patrick) - S...
ISC Diary | How Good is your Employee Termination Policy?
Main Page - DAE Tools
Websecurify | Web Application Security Scanner and Manual Penetration Testing To...
Installing Nginx With PHP5 (And PHP-FPM) And MySQL Support On Ubuntu 11.04 | How...
COOPY: cooperative data
GNU Parallel - GNU Project - Free Software Foundation
ezblueprint.com
How Fast Can You Type? Develop a Tiny Utility in Bash to Find Out | Linux Journa...
Tornado Web Server
ZenMagick: Smart e-commerce
wissel.net :: How eMail encryption works and why it is an utter public failure
eHour - Timesheet Management
OpenProj Open Source Project Management Software — Serena Software
PDFedit - pdf manipulating library, GUI, tools
RedNotebook
Collabtive - Open Source collaboration
Yammer : The Enterprise Social Network
Uninstallers (removal tools) for common antivirus software - ESET Knowledgebase
IBM Lotus Domino and Notes Information Center
The great Lotus Notes installation guide
NetShelter CX - Product Information
Learn about EDI with EDI Basics
SecretSocial — conversations, uncut.
Analog engineering legend Bob Pease killed in car crash - 2011-06-20 17:25:32 | ...
Make: Online | Bob Pease
Analog by Design Show - Reality TV for Design Engineers
Wieldy » Homepage
SQL Server Benchmark tools and stress testing tools - Sriram"s 2 Cents - Site Ho...
Hibernation does not work after install of Windows 7 or Windows Server 2008 R2 S...
Run .Net Script activity fails for simple PowerShell script, why? - Yao"s Whiteb...
Equipment Needed to Get “Started” in Electronics - Hack a Day
DjVuLibre: Open Source DjVu library and viewer
Windows XP File Assocation Fixes
Tiff plugin
winisoutils - Windows ISO Disc Image Utilities
The Next Steps On The Road To Becoming A CSS Jedi Master
5 Baby Steps To Learning CSS & Becoming A Kick-Ass CSS Sorcerer
PreLoved Computers | Cheap Refurbished Computers & New Computers Parts
Wireless CCIE, here I come!: What"s in *my* backpack?
My Toolbag | Router Jockey
» What’s in my toolbag FryGuy"s Blog
My favourite tool in my toolbag! « Network Janitor
Code Browser - A Folding Text Editor
Mimo Monitors - Welcome
Why businesses move to the cloud: They hate IT | ITworld
TFS Integration Pack and Scripting using PowerShell - Yao"s Whiteboard - Site Ho...
Which VMs set your Slot Size ? « « Virtu-AlVirtu-Al
Moving my site to a XEN VPS at Linode.com
Diagramly - Draw Diagrams Online
OpenStudy – Make the World Your Study Group
courteous.ly: publish your email load
Microsoft IT Deploys Internet Explorer 9 - Nick MacKechnie - Site Home - MSDN Bl...
Simple grep in .net - Random thoughts of a dev - Site Home - MSDN Blogs
The Tactics of Making a Strategy - The Colorful and Gray World of Engineering Ma...
Why do IT Projects Fail? - Canadian Solution Developers" Blog - Site Home - MSDN...
Whats the backup compression in SQL server 2008 and how it can help to optimize ...
Quick & Dirty Usability Techniques for Developers - Susan"s Developer User Exper...
e-Discovery Team Training | In-depth legal education
organic fertilizer: viewing internet headers of emails in outlook 2010
Gartner Publishes First Magic Quadrant for E-Discovery Software | e-discovery 2....
KeepNote: Note taking and organization
Backup and Restore in SQL Azure - UK ISV Developer Evangelism Team - Site Home -...
What is Agile Results? - J.D. Meier"s Blog - Site Home - MSDN Blogs
IT is part of the business, but not for the reasons you think - Inside Architect...
WGet 2 for PowerShell - Huddled Masses
What"s in Your Tool Bag? - Packet Life
Foreign Language e-Discovery – An Introduction | E-Discovery Resources & Informa...
» Linuxaria – Everything about GNU/Linux and Open source Using a Rewrite in Ngin...
The Electronic Discovery Reference Model
E-Discovery Solution Offering - MIKE2.0, the open source methodology for Informa...
FreeEed
Open Source Could Change the Future of E-Discovery
Lenny Zeltser on Information Security
Mibble :: MIB Parser
Postini Message Analyzer - Postini Help
Cable Modems and Wiring Issues | DSLReports.com, ISP Information
wissel.net :: Ban the Urgentors!
On the changing role of PowerTOP « Arjan van de Ven"s blog
Index of /pub/linux/status/powertop
LessWatts.org - Saving Power on Intel systems with Linux
Free Geek Vancouver Volunteer Blog: Another hack: Wiretap picture frame
Get the Most Value Out of Your Luggage Deal
this 8-bit life - this 8-bit life
Dallas Makerspace
NetRexxSite
Welcome to Jenkins CI! | Jenkins CI
Monit | Monitor processes, files, devices and remote systems
Buildbot
Google voice - update, incoming and outgoing both from ATA - Free - sipsorcery n...
GWAVA: Trial Downloads of GWAVA products
E-Discovery Life Cycle - @Legal Discovery
Association of Information Technology Professionals -- AITP
aitprich
Liblicense: Licensing Digital Information
Main Page - Linux Mint
BlueCows
Linux in the Ham Shack
Shrubbery Networks - TACACS+ daemon
Lulz Security® (LulzSec) releases
JOSSO - Java Open Single Sign-On Project Home - Atricore
javascriptRRD - Client-side access to RRD files
Tiki Wiki CMS Groupware | Tiki Wiki CMS Groupware - Software made the wiki way.
Seccubus - Easy automated vulnerabilty scanning with Nessus and OpenVAS
Rob Hirschfeld"s Blog
TaciX in Launchpad
neatx - An Open Source NX server - Google Project Hosting
Open Source Two-factor authentication: The WiKID Community Edition — WIKID Stron...
Rundeck.org - Open Source Automation
Func
Cloud Installer (system wide, bare metal, system prereqs, components, networks) ...
cobbler - Trac
VMware Communities: Open Virtualization Format Tool
Deltacloud | Many Clouds. One API. No Problem.
Apache Libcloud Python library - Apache Libcloud is a standard Python library th...
jclouds
Sheepdog Project — Sheepdog Project
Welcome to xen.org, home of the Xen® hypervisor, the powerful open source indust...
BitNami: Open Source. Simplified
OpenTBS | freshmeat.net
scit - Simple Continuous Integration Tools - Google Project Hosting
Linode.com Xen Virtual Server Review « HostingFu
Linode - Xen VPS Hosting
GenPlay - Revision 354: /
Web Start - GenPlay, Einstein Genome Analyzer
Oxford Journals | Life Sciences | Bioinformatics
Getting started with Sage | Packt Publishing Technical & IT Book and eBook Store
iTUNES STORE - TERMS AND CONDITIONS
DailyTech - Digital Black Friday: First Bitcoin "Depression" Hits
Medsphere.org: Home
Grace Hopper Celebration 2011
POSSCON 2011 » Palmetto Open Source Software Conference
EtherPad: Open-Sourced!
EWB-USA
Home | Random Hacks of Kindness
The Humanitarian FOSS Project - Home
OpenMRS » Open source health IT for the planet
Humanitarian FOSS
Sahana Software Foundation
Humanitarian FOSS
open-zwave - An open-source interface to Z-Wave networks. - Google Project Hosti...
Androidclone.com » Laika
Adding and Removing SPClaimProvider via PowerShell - Shawn Cicoria - Site Home -...
SQL Server Black Box - Shoham"s Tech Blog - Site Home - MSDN Blogs
I, Cringely » Blog Archive » When Engineers Lie - Cringely on technology
Number of Physical & Virtual CPU’s per host & Cluster « « Virtu-AlVirtu-Al
Seth"s Blog: Email checklist (maybe this time it"ll work!)
Bleeding Edge - Install Major Apps Not Available in Ubuntu Software Center Easil...
The Fruits of DEX Begin to Emerge
Rowscope
AnandTech - ZFS - Building, Testing, and Benchmarking
Micro Center - Computers, Electronics, Computer Parts, Networking, Gaming, Softw...
The meanings and origins of sayings and phrases
Performance & Security for Any Website | CloudFlare | Home
Open thread: Super mario bros accapella by Jimmy Wong | Geek Feminism Blog
Linux Basement | Linux Lurking Beneath
tuxgraphics.org: A Digital DC Power Supply (programmable bench power supply unit...
SQL Server Virtualization, Consolidation and Private Cloud Resources - SQLOS Tea...
Tooling News: Web Application Configuration Analyzer Released - The Security Dev...
Chrome Experiments - Shaun The Sheep
Linux Canada
KwateeSDCM
marcelog PAMI: PHP Asterisk Manager Interface OOP Event driven client
App::Slackeria v0.1
phpMyFAQ homepage - open source FAQ software | welcome
Those non-IOS Files on the Flash. Are they useful ?
TestLink 1.9.2 RELEASED (2011-03-19)
www.chamilo.org | open source e-learning and collaboration software
Cisco IOS Hints and Tricks: What exactly is a Nexus 1000V?
Free Image TOOL: Image Composite Editor, this is the latest version as of May 26...
Microspeak: The planned unplanned outage, and other operations jargon - The Old ...
OSI model - Wikipedia, the free encyclopedia
Carl Malamud, in his book "Stacks," defines layers 8, 9, and 10 as "Money", "Politics", and "Religion". The "Religion layer" is used to describe non-rational behavior and/or decision-making that cannot be accounted for within the lower nine levels. (For example, a manager who insists on migrating all systems to a Microsoft platform "because everyone else is doing it" is said to be operating in Layer 10.)
A Human Factors Extension to the Seven-Layer OSI Reference Model
TouchStudio - Microsoft Research
Ingredient Pairings
Troubleshooting with the Microsoft Exchange RPC Extractor (or, the case of the m...
TKP Tips: Teaching the SmallBasic HOUSES recipe - Contagious Curiosity - Site Ho...
Where are all the IT jobs? Here: Fastest-growing skills in the fastest-growing c...
The year in IT/computer/telecom awards: 2011 timeline
TKP Tips: Making a SmallBasic runnable flash drive - Contagious Curiosity - Site...
Hints for better cleaning of homemade printed circuit boards.
YouTube - LCD Monitor Teardown
YouTube - Hard drive teardown
Introducing QueueMetrics Espresso || Loway
WindDbg – setting up symbols - UK Premier Support for Developers - Site Home - M...
Programming is for Girls - Computer Science Teacher - Thoughts and Information f...
Free Fast Public DNS Servers List
Data Cables | Adapters | Amplifiers | Antennas | Wireless Adapter Products from ...
Power Cords, Power Strips and Power Adapters
Synscan - Programs - arping
Analysis Services Operations Guide
Create Your Own Mac Fixit Toolkit
Microsoft Standalone System Sweeper Beta | Microsoft Connect
New IT Compliance Solution Accelerator – Now in Beta Release! - Nick MacKechnie ...
Kelverion Configuration Utility for OpConsole - Kelverion
Get your developers ready - Office 365 is coming - Education - Site Home - MSDN ...
PowerShell Diversion #3: Discussion - richmac - Site Home - MSDN Blogs
Gathering list of databases names from multiple SQL Servers - Simplifying Life o...
tuxgraphics.org: A Digital DC Power Supply (programmable bench power supply unit...
NYC Resistor » Electronics, Hacking, Classes, and Workspace.
OWASP Zed Attack Proxy Project - OWASP
schema.org - Home
How to succeed in IT without really trying | Data Center - InfoWorld
It so feels like 1999. :)
Move the VirtualCenter SQL database or migrate the VirtualCenter SQL database to...
Why do Group Policy settings require me to have a degree in philosophy? - The Ol...
Organizing MP3s based on metadata with TagLib# and IronPython - Saveen Reddy"s b...
Free Training kit for Sharepoint and Office365 - Secret Microsoft Communications...
Disk usage analysis and cleanup tools | Linux.com
QueueMetrics - Call center monitoring solution for the Asterisk PBX || Loway
Undelete Files on an ext3 or ext4 File System | everyday linux how2s
SHA1/MD5/MD4 bruteforcer for ATI and nVidia GPUs
Crypto-Gram Newsletter
Cisco IOS: What is VLAN 1002 - 1005 used for ?
naev - 2d action/rpg space game - Google Project Hosting
Does Free Software Restore Dignity? | PCWorld Business Center
Memory Inspector
2600 NEWS: HELP US COMPILE THE HACKER CALENDAR
mınutes.io — take it easy!
terminal.se - code
Switched Ports - DD-WRT Wiki
Encumbrance-free Telepresence System with Real-time 3D Capture and Display using...
OpenSchedule for Android - Android Market
Karmasphere Studio Community Edition
Pit : PIT Mutation Testing
Unzix - A WinZix archive extractor
Resource page for morse 2.4
How to create your own offline repository for Web Platform Installer with Powers...
Open office dilemma: OpenOffice.org vs. LibreOffice | Applications - InfoWorld
Index of /prog/masqmail
naufraghi / plow / source – Bitbucket
CityCamp Raleigh
File upload
Why “Bring Your Own Device” Is Seriously Flawed — The Lone Sysadmin
Learn XML in 4 Minutes | The Integration Engineer
SCPrompt 1.11.4.47 (Roll-Your-Own) Alpha Release - VNC2Me
Guide to setting up your own remote helpdesk with Single Click VNC - Lucas719.in...
How to name a SPN (part 2) - Authentication and Authorization - Site Home - MSDN...
I am root! – IP camera shell access - Hack a Day
sigil - A WYSIWYG ebook editor. - Google Project Hosting
Simple VGA interface for tiny FPGA boards - Hack a Day
The Store Sales Cycle: Your Monthly Guide to Clearance Prices | Wise Bread
markkerzner/FreeEed - GitHub
EDD Update: FreeEed Open Source eDiscovery Tool Debuts
Unofficial ReadyNAS Guides — Manuals for the NetGear ReadyNAS
antivirusmulti - a software which allows using multiple antivirus engine with mu...
SourceForge.net: viking
Get the Most Out of phpMyAdmin’s Visual Query Designer | Wazi
skype-open-source: Skype protocol reverse engineered, source available for downl...
Protected Mode Troubleshooting | Adobe Reader
Some Symantec Endpoint Protection configurations. Users should update to Symantec Endpoint Protection 11.0 RU6 MP2 or higher.
contagio
Experimental Error: Fetus Don"t Fail Me Now - Science Careers - Biotech, Pharmac...
CamStudio - Free Screen Recording Software
Big data meets big storage: an in-depth look at Isilon"s scale-out storage solut...
As a baby nerd, sitting in the back room of my parents" house and dialing into BBSs in the late "80s and early "90s, I dreamed of "big iron." Like Kevin Flynn, I tried to imagine what happened to my data on the other end of the phone line—where were the modem"s bleeps and hisses and scratches headed? What did that place look like? I imagined huge, frigid halls of raised floors under an actinic glare, populated by endless rows of towering, Cyclopean racks of complex equipment, studded with countless blinkenlights that sparkled off into the distance. More than any other experience, it was this desire to know what"s behind the curtain, to see and learn about the systems that provide service to other systems, that pushed me toward a career in IT.
VeroBoardUino Part Three – Crystal and Final Connections at Marengo
VeroBoardUino – Part 2.5 – Circuit Diagram and Parts List at Marengo
VeroBoardUino – Part Two – Serial Connector and Reset Button at Marengo
VeroBoardUino – How to Build an Arduino-Compatible Board for Very Little Money a...
Donate to the Ada Initiative: Seed 100 funding round opens – The Ada Initiative
About: OpenNode
Inventing Unix - IEEE Spectrum
STANTOR-DOMODULOR
m23 the OpenSource Linux software distribution and management system / m23 das O...
Drawing bearing and distance property line using C#/SVG/IE9/Visio (V2) - Feng Yu...
Managing Hardware Snapshots on Failover Clusters - Clustering and High-Availabil...
Buying a Home? Pay Attention to Property Inspection
Seth"s Blog: How to be interviewed
Apple"s North Carolina data center now visible on Google Earth
Quick tip : Diagnose DirectX problems - The blog of Rob Margel - Windows Help - ...
Netduino :: home
Installing across network may slow Visual Studio 2010 and Service Pack 1 setup -...
EasyTransfer Arduino Library « The Mind of Bill Porter
Analyzing Event Log Entries in PowerPivot - Analysis Services and PowerPivot Tea...
Physical Keygen: Duplicating House Keys on a 3D Printer | eclecticc
SNEAKEY ::: Key Bumping is for Hacks
The Project Road Map for 2010 has been released - Microsoft Project 2010 - Site ...
Cascading Style Sheet (CSS) Color Negatizing Script - Robert McMurray"s Blog [MS...
LCD: Replacing CCFL with LEDs - Hack a Day
Fun With the MAPI Spooler - SGriffin"s MAPI Internals - Site Home - MSDN Blogs
Kawamura Ganjavian - OSTRICH
Growing TFS databases - bharry"s WebLog - Site Home - MSDN Blogs
Performance Engineering Notes/Domino Applications
Client_Clock=1 Debug_Console=1 Debug_Outfile=
wansim - WANsim allows you to emulate a WAN connection - Google Project Hosting
Cisco IOS Hints and Tricks: EVB (802.1Qbg) – the S component
Map Values to Altiris Asset Management and Helpdesk Solutions | Symantec Connect...
SQL Server 2005 SP4, KBA 2463332, Installation Issues - Chaitanya"s Blogs -- SQL...
KisMAC - Welcome
Kismet
inSSIDer | MetaGeek
What"s killing your Wi-Fi? | Analysis | Features | PC Pro
MyOpenRouter : The Premier Online Community for NETGEAR"s WNR3500L & WGR614L Ope...
Froxlor - Server Management Panel - Home
Hardware for Linux - Home
Microsoft Safety Scanner - Remove Spyware, Malware, Viruses Free
whatsitworth-complete.pdf (application/pdf Object)
Flux - Enterprise Job Scheduler. Managed File Transfer. Data and Business Proces...
Le site officiel de Platypux
Nagstamon :: Home
Roundup Issue Tracker — Roundup v1.4 documentation
Paul Tarjan
One-Key Keyboard Hack
RECOLL: a personal text search system for Unix/Linux
MP: Lua CJSON
Automatic Footers: Toothless Legal Verbiage Causes Search Headaches | Catalyst E...
virtuallyGhetto: How to query for MACs on internal vSwitch on ESXi
Using the View PowerCLI cmdlets from another machine « « Virtu-AlVirtu-Al
Getting and Verifying SSH Fingerprints « UNIX Administratosphere
SandBox - Projects by Darkrose - Turious
Ensuring that a script runs as root only
Return Infinity - BareMetal OS
/etc/shadow format « UNIX Administratosphere
BaGoMa
SLR Camera Simulator | Simulates a digital SLR camera
Cracking a Skype call using phonemes
I, Cringely » Blog Archive » Geeks like me: What’s Engadget really worth? - Crin...
How To Recover Lost Files In Dropbox
Monitoring Social Media for Security References to Your Organization
SPAuto - Home
Microsoft IT SharePoint 2010 Deployment Using Automated Processes
Arabic a Complex Script - Developing Arabic applications should be easy! - Site ...
Internet Explorer 8 keyboard shortcuts
Internet Explorer 9 keyboard shortcuts
Translating Ada Lovelace - mathematical science is an instrument - Matthew van E...
Meet the Top 20 Mobile Networks in the World Mobile Technology News
How to Avoid Moving Scams | Wise Bread
GoldenEggs x86-64 Servers
securactive/junkie · GitHub
Clzip - A C language version of the lzip lossless data compressor
LepoLand - A Blog by Alan Lepofsky - Why Twitter Annoys Me As A Discussion Tool
Virtual Floppy for Windows
AnandTech
The Tech Report - PC Hardware Explored
chrysocome.net - RawWrite for Windows
Here We Go Again: How to Tell a Bubble When you See One - ConsortiumInfo.org
Build a DIY brushless motor controller in a day (ish) - the spingarage blog
Lithium-Ion (LiIon) & Lithium polymer (Lipoly) battery tutorial
Simple Bench Power - Hack a Day
Tools: Saleae Logic, logic analyzer - Hack a Day
Zentyal - The Linux Small Business Server
Digaboard
Overview | Onepoint - Project and Resource Management | Innovation means Change
OpenKM Document Management System | Open Source DMS - Home
scapy.pdf (application/pdf Object)
Deckmaster
Mafait.org - project Thinknowlogy - Artificial Intelligence by Design • Designed...
massXpert | Main / HomePage
Fun with ethtool | Linux Journal
Keynotopia: User Interface Design Libraries for Keynote, PowerPoint and OpenOffi...
Opendedup
Doug"s Windows 95/98/Me/XP/Vista Tweaks and Tips
Windows 7 Power Free
Acc2010: You receive error "The database cannot be opened because the VBA projec...
Exclusively for PayPal Customers | HopShopGo
How To Change & Fix Broken File Type Associations In Windows 7
scrumblr
Nagios plug-in development guidelines
Sysadmin ramblings
Nagios Config to monitor ReadyNAS Devices - comdivision consulting tech wiki - C...
Jan-Piet Mens » Gathering Replica Information from Domino"s cldbdir.nsf
http://www.readynas.com/download/SNMP/READYNAS-MIB.txt
wkhtmltopdf - Convert html to pdf using webkit (qtwebkit) - Google Project Hosti...
Jan-Piet Mens » Monitoring a ReadyNAS NV+ with Nagios
Nagios SNMP Monitoring plugins | Download Nagios SNMP Monitoring plugins softwar...
fgp/AirReceiver at STABLE_1_X - GitHub
OsmocomBB
BlueProximity - GNOME Bluetooth device distance detection and automatic locking ...
Why every technician should own a Dremel Stylus « The Angry Technician
Profile Migrator is Part of Project Morpheus | sepago
Experience Project Morpheus » ocb - Citrix Community
Trojan Feigns Failures to Increase Rogue Defragger Sales | Communauté Symantec C...
xoscillo - A software oscilloscope that acquires data using an arduino or a para...
Real World Computing: How to Do a Mail Merge to Email using Lotus Notes
BlackBerry Today | Spiked Studio Productions
SCCS - The POSIX standard Source Code Control System.
Helge’s Profile Toolkit | Helge Klein
IBM Lotus Domino and Notes Information Center
Sed - An Introduction and Tutorial
Literature.org - The Online Literature Library
FAI - Fully Automatic Installation
System Administrator Interview Cheat Sheet
Operational Efficiency – Free SQL Server Licensing Guide from Independent Analys...
Scholarly HTML | Guidelines and tools for web based research and scholarship
community broadband networks | Helping Communities Achieve True Self-Determinati...
Super User Blog
Windows 7 Network Awareness: How Windows knows it has an internet connection - S...
How Windows 7 Network Awareness works
Tact Filters
MSDN Subscriber Downloads - product availability depends on your subscription pr...
New Microsoft TechNet things
Japanese Cellular Phones FAQ
Web Deployment Made Easy: Seriously - Palermo4 on MSDN - Site Home - MSDN Blogs
System.Data.SqlClient.SqlException: Login failed for user "NT AUTHORITY\ANONYMOU...
Diagnose and repair sound playback and recording problems automatically - The bl...
Possible cause of error code 1719 or 1723 when installing a 64-bit MSI - Aaron S...
NuGet Project on OuterCurve
SharePoint 2010: people picker issue "There was an error in the callback" - ISG ...
MSDN Blogs - Free sharepoint
Separation of Duties for DBA customer ready white paper - My Application Platfor...
SharePoint Adventures : ADFS Setup – Part 1 - CSS SQL Server Engineers - Site Ho...
Cainteoir Text-to-Speech — Listen to and Record ePub and HTML ebooks
Nagios & Icinga Plugins - Transitiv Technologies
» Linuxaria Nethogs, Iptraf – for network statistics
Testing in Python using doctest | Packt Publishing Technical & IT Book and eBook...
Ubuntu 11.04 Unity Keyboard Shortcuts and Tricks - Softpedia
The New Domino Admin » Blog Archive » BES Server: Upgrade to 5.0.3 MR2 Gone Wild...
Fixing Lotus Notes so the inbox opens by default | Chris Gonyea
Facebook Download is Self Collection | The Many Faces of Mike McBride
TortoiseHg
Speeding Up SSH Access « UNIX Administratosphere
Google Sets
Notes
Dan Carlin - Hardcore History
Sandboxie - Sandbox software for application isolation and secure Web browsing
The Modern Day Pirates | Category Archive | Laughing Historically
BBC - A History of the World - Home
BackStory with the American History Guys | VFH Radio at the Virginia Foundation ...
Binge Thinking History Podcast
Matt"s Today In History on Mevio
History According to Bob | History Podcasts
BBC - Radio 4 - In Our Time - Homepage
History on Air
MySQLDumper - Backup your MySQL-Database (e.g. forum, guestbooks and online shop...
New & free: Delprof2 - User Profile Deletion Tool | sepago
virtuallyGhetto: Semi-Interactive automated ESXi installation
HA and DRS Audit « « Virtu-AlVirtu-Al
Repair Messed Up EXE File Association - The Grim Admin
Stylesheet Limits in Internet Explorer - EricLaw"s IEInternals - Site Home - MSD...
Time Management Checklist - J.D. Meier"s Blog - Site Home - MSDN Blogs
Packeteer PacketShaper: Inbound, Outbound, Inside and Outside. Which is which ?
Project Freelancer
25 Easy Organizing Changes You Can Make Today | Wise Bread
Empathy - GNOME Live!
Ekiga ~ Free Your Speech
Linphone, open-source voip software | Linphone, an open-source video sip phone
Thymer - Super easy Planning, Task and Project Management
Time Synchronization and Domain Controller VM"s - Hyper-V notes from the field -...
How to eliminate tempuri.org from your service WSDL - Ron Jacobs - Site Home - M...
SQL Server Compression Estimator - Home
BoxCryptor :: On-the-fly Encryption for cloud storage
VidCoder - Home
NETRESEC Products - Tools and Applications for collecting and analyzing network ...
Arduino Tutorials « t r o n i x s t u f f
FreeNAS 8.0 | Storage For Open Source
IBM - Understanding the Full Access Administrator Feature in Domino Release 6
Maven License Verifiery plugin - Introduction
The New Domino Admin » Blog Archive » Lotus Domino Clusters: Code To Scan Mail F...
cabextract
SwarmTV Introduction
WiKID - Rhymes with Wicked. — WIKID Strong Authentication
Reportico Open Source PHP Reporting Tool
SimpleHRM
flophase - simple cash flow management
SharePoint Connoisseur: SharePoint 2010 Warm up script comparison
Thank You, Kim! - Vibro.NET - Site Home - MSDN Blogs
What does the different colours of the address bar in IE9 mean - The blog of Rob...
AtomicParsley
Jim Breen"s Japanese Page
MS Mincho font
Error Codes (Windows)
How to remove malware belonging to the family Rootkit.Win32.TDSS (aka Tidserv, T...
Download details: Microsoft Product Support Reports
Microsoft"s Premier Support Reporting Tool will save time and your sanity | Beta...
Mix-It-Quik Concrete Mixer, Cement Hand Mixing Tool
LetoDMS is an open-source, web-based document management system.
Secure FTP, SFTP Server, & Secure File Transfer Software
Main Page - Observium
Omniback for the System Administrator
AppleCrate II: A New Apple II-Based Parallel Computer
CloudBees: Cloud Platform as a Service for Java Web Apps, Supported Jenkins/Huds...
Hudson Continuous Integration
Jenkins! | Jenkins CI
hudson fork
Regmon by Sysinternals.com
Windows Double Explorer
38 Life Lessons I’ve Learned in 38 Years | zen habits
Managing IT….people – Storagebod
Building Configuration Policy Checks, Part 1 - Applied Infrastructure
Truly agile project management with GreenHopper for JIRA
Final Computer Related Examination Patent Guidelines (BitLaw)
Batch Renaming Files With Windows PowerShell | Thu 28 Apr 2011 | Blog | CodeStor...
LAW PreDiscovery
What is it ?
UNIX Utility of the Day: watch — The Lone Sysadmin
KCMENU- Unix Menu Program (Perl)
Script to Reset WSUS for SysPrep"ed Image - Random Musings of Jeremy Jameson - S...
SQL Server Installation : Useful tools - Chaitanya"s Blogs -- SQL Developer find...
How to automate a command line utility like DiskPart (vbscript) - Decrypt my Wor...
Broadcast Storm - The Cisco Learning Network
Of Clouds And Perceptions Of Risk - Chuck"s Blog
Linux Defense in Depth | PCI Compliance Articles & News
openpom | freshmeat.net
Monitoring Plugins
The AWS Outage: The Cloud"s Shining Moment - O"Reilly Broadcast
Design for Failure
Replication of this database is not permitted - By Ulrich Krause - eknori.de
Ubuntu Linux boosted by 10,000 seat PC win | ITworld
Upgrade Your Linksys Router, Literally! - Darwin Mach
iPhoneMap: iPhoneTracker port to Linux
AWS Service Health Dashboard - Apr 23, 2011
DeTraS | Download DeTraS software for free at SourceForge.net
DSIRE: Incentives/Policies by State
Is It Better to Buy or Rent? - Interactive Graphic - NYTimes.com
Another IPv6 Crash Course For Linux: Real IPv6 Addresses, Routing, Name Services...
What is WRITELOG waittype and how to troubleshoot and fix this wait in SQL Serve...
The real “legacy” network adapter - Virtual PC Guy"s WebLog - Site Home - MSDN B...
Why am I getting prompted for Credentials? - CSS SQL Server Engineers - Site Hom...
Largest use of Whitebox Fuzzers finds GIANT number of security bugs in Windows 7...
University of Wisconsin, Madison finds GIANT number of security bugs during Wind...
Learning With Visualizations - Computer Science Teacher - Thoughts and Informati...
Administering GP Security - Dynamics GP Support and Services Blog - Site Home - ...
Research: What is Automated Reasoning - Sam Stokes on Research in your life and ...
SproutCore Blog - SproutCore 1.5 Released
Setting your machine power plan via Powershell –repost - SharePoint Infrastructu...
64 Logical Proce...
Update to the F# 2.0 Free Tools Release, Corresponding to Visual Studio 2010 SP1...
sec-wall :: Home
conman - ConMan: The Console Manager - Google Project Hosting
PowerShell Diversion #1: Discussion - richmac - Site Home - MSDN Blogs
MSDN Magazine Digital Magazine Downloads
TechNet Magazine Digital Downloads
Seth"s Blog: Get better at buying
Tinkernology: Four Lego Delta Robots
THE VIEW Online Knowledgebase
THE VIEW -- 7 Ways to Ease Users’ Transition from MS Outlook to Lotus Notes
The switch from Microsoft Outlook to IBM Lotus Notes is typically the result of a business decision or acquisition, so most users don’t get a choice in the matter. And although there isn’t much you can do as a Domino administrator to affect the culture of an organization during this change, you can do a great deal to ease the transition from Outlook to Notes so that users can be productive right away:
(de) Fortunes::Flashrider v0.90 (BB-Styles Edition)
Heilbrunn Timeline of Art History | The Metropolitan Museum of Art
Conflict History | 1265-1267
World History
Kings Quest III: Remade & Ready To Rock [Mac & Windows]
4 Ways To Reduce The Size Of A PDF File
2 Effective Ways To Browse Through Google Reader Feeds
ERUNT and NTREGOPT
Storybook - Open Source Novel Writing Software for Novelists, Authors and Creati...
Practice your personal Kaizen
Nagios and the Ampersand Character in URLs « UNIX Administratosphere
sed is truly ancient, yet many Unix folk use it daily.
Cisco IOS Hints and Tricks: Distributed firewalls: how badly do you want to fail...
Cellebrite - Mobile Forensics and Data transfer solutions - Mobile Forensic Prod...
SSRN-Ghosts of 1932: The Lost History of Estate and Gift Taxation by Jeffrey Coo...
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1 FP1: Code To Fix All Da...
Lotus Notes R8.5.1 FP1: Code To Fix All Day Events Created in a Different Time Zone (That Are Currently Messing Up Your Busytime)
Download Install Full Version of Internet Explorer 6.0
"C:\Windows Update Setup Files\ie6setup.exe" /c:"ie6wzd.exe /d /s:""#E"
NagiosQL | Webbased Nagios and Icinga Administration
Arduino geiger counter brings open source radiation detection to the geeky masse...
How to automatically replace files when updating WordPress | Free Software Tips ...
Blue Microphones
Webcast Testing Site
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1 FP1: My Simple Solution...
Your iPhone is silently and constantly logging your location
Speed up large MySQL backup, dump, restore processes | Linux Admin Zone
Stresslinux
Dradis - Effective Information Sharing
Where is ASP.NET 3.5 on IIS ? - The Way I See It - Site Home - MSDN Blogs
ZFS Backup & Recovery using Hadoop HDFS « Cuddletech
Parasitic Hadoop - c0t0d0s0.org
Erase a CD like a boss (video) -- Engadget
Opus Domini for mac
uraniacast
Online Scrum Tool / Agile Software Development Management Site
There and Back Again... - Blog - Bill"s Blog
BLDGBLOG: Islands at the Speed of Light
Islands at the Speed of Light
The Master Gardeners
The origin of CTRL-ALT-DELETE - Hack a Day
Hacking Cisco
organic fertilizer: sccm: client stuck downloading package with bit .tmp files i...
IEZoneAnalyzer v3 - Microsoft"s USGCB Tech Blog - Site Home - TechNet Blogs
Negotiating Your Salary: How to Make $1,000 a Minute
pydnsadmin - Python class to administer DNS servers effectively - Google Project...
STAsoft.net | The key to the success
Thinkmap Visual Thesaurus - An online thesaurus and dictionary of over 145,000 w...
FAN 2.1 available
Get Help with Microsoft Excel Tips, Excel Tutorials from a Spreadsheet Addict
Welcome to Cloud Foundry
U.S. scientists unveil worlds first computerized human brain map
Your first PDF form with Scribus - Scribus Wiki
gpEasy CMS Home - gp|Easy CMS
Raptor 2.0 - Forensic Acquisition and Preview - Simplified
SQL Server Customer Advisory Team - SQL Server Best Practices
DiscRotate by Georg Wacker
Evince – Simply a document viewer
Unlogic.se - Eagle DNS
DBeaver
jhl::mafipulation
Gluejar, Inc.
Cloud Scenarios Hub on TechNet - J.D. Meier"s Blog - Site Home - MSDN Blogs
CIPE - Olaf Titz
Tips and Tricks: Templates, your shortcut to becoming an expert - Microsoft Proj...
Printers and Photocopiers Solutions: Paper Charactiristics, Standard Sizes and C...
autoplot.org - Main Page
The Top 10 Movies for Computer Science Students | Online College Tips - Online C...
C-Kermit 8.0 - Interactive Communication, File Transfer, and Scripting across Se...
Open Compute Project
How To Use Microsoft Word Mailings To Automate Emails
My Top Lessons Learned as a Computer Technician | Technibble
organic fertilizer: misc: offering remote assistance in windows 7
The Role Of Service Providers In Breaking The Stockholm Syndrome - Chuck"s Blog
You spent HOW much on our new server and the app slowed DOWN??!! - Notes from a ...
Rip, Watch and Organize Everything: The Ultimate Media Guide
Banshee » Banshee 2.0.0
Elderly Georgian lady disconnects Armenian internet for half a day... by acciden...
Free Academic Open Access Books, Journals and Research Papers | InTechOpen
Teach Yourself Programming in Ten Years
Migrating Windows: What data contains your roaming profiles? – Use Powershell to...
Exploring NDIS’s WMI classes - The NDIS blog - Site Home - MSDN Blogs
Negotiating 101: The 5 Buyers You Meet In Hell | Wise Bread
iClarified - Finder
Diagnostics with Event Viewer - The NDIS blog - Site Home - MSDN Blogs
Diagnostics tools in NDIS - The NDIS blog - Site Home - MSDN Blogs
KB16270-Drafts do not synchronize with the BlackBerry smartphone
ST EDI Enveloping | The Integration Engineer
What is the GS segment? | The Integration Engineer
What is in the ISA? | The Integration Engineer
EDI Enveloping Part One - How it works | The Integration Engineer
EDI Primer - find the answers to EDI here. | The Integration Engineer
X12 Technical Tutorial - Syntax and Control
http://publib.boulder.ibm.com/infocenter/wtxdoc/v8r2m0/index.jsp?topic=/com.ibm....
X12 Properties
VMware Communities: vSphere 4.1 Hardening Guide
VMware Communities: vmwarevSphereSecurityHardeningReportCheck.pl 1.5
Seth"s Blog: Who"s responsible for service design?
In my experience, most of the problems are caused by ignorance and isolation, not incompetence or a lack of concern.
A Fistful of Dongles: An Interview with Shafik Punja
Great list of tools, books, etc
iPhone backup with iTwin | Contacts and SMS - Save and Export !
iPhone Backup Extractor for Windows and Mac
ipddump - Extract your information from a blackberry backup IPD - Google Project...
Mena Step Innovative Solutions - Magic Berry IPD Parser
Peter F. Hamilton
Download details: Microsoft iSCSI Software Target 3.3
Microsoft iSCSI Software Target 3.3 for Windows Server 2008 R2 available for pub...
en:start [FusionDirectory Website]
How to Compute Basic Statistics with R - O"Reilly Answers
Tintri - Storage for VMs
OSSEC and VMware
SAP on HP-UX Best Practices - Part 1
jHepWork
Data Visualization Software | Tulip
Gambas - Gambas Almost Means Basic
Scaling and Queuing PowerShell Background Jobs - Windows PowerShell Blog - Site ...
Enable Display Mirroring on First generation iPad | Nature"s Eye Studios
Veusz - A Scientific Plotting Package
OpenShot Video Editor
Splashtop Remote Touchpad for iPhone 3GS, iPhone 4, iPod touch (3rd generation),...
Highly Useful Resources for Android App Development | TechSource
ExhibitCore Floor Planner
The Ultimate Guide To Managing Batteries On Location | DIYPhotography.net
32- and 64-Bit Connectivity from the Same Machine - Microsoft SQL Server Develop...
Loading SQL Server Snapins into your PowerShell Session - Dan"s Blog - Site Home...
ruddigkeit.net » Applying a Fix Pack to Lotus Notes on USB (Nomad)
Mondrian - Interactive Statistical Data Visualization in JAVA
Discover Microsoft Office 2007 & 2010 - Microsoft UK Faculty Connection - Site H...
Opalis Community Releases
HP ProLiant Server and BladeSystem Management Packs for Microsoft System Center ...
blog.opennebula.org
http://william.leibzon.org/nagios/
Nagios Exchange - check_netstat
WMI Query Tool : random.geek()
ciphron - advanced security: Downloads
Interesting Projects–A Collection - Computer Science Teacher - Thoughts and Info...
virtuallyGhetto: How to automatically add ESX(i) host to vCenter in Kickstart
Update SQL Server Statistics with Powershell - olivier pieri"s WebLog - Site Hom...
Moving to the Cloud - the Microsoft experience - Education - Site Home - MSDN Bl...
Managing Local Backups with Windows Server Backup : Brian Desmond"s Blog
O"Reilly Commons - WikiContent
lnacls
Monster Savings – Delivering Costco Savings to Your New York City Home or Office
iPhone, iPad, iPod touch: Supported Bluetooth profiles
HFP
Bluetooth profile - Wikipedia, the free encyclopedia
TRUPAX.COM - Download
Cisco IOS Clocks and NTP - Packet Life
AFCEA International - The Armed Forces Communications and Electronics Associatio...
Official Site Of Andy"s PHP Knowledgebase Project
Computing pioneer Jean Jennings Bartik dies | Ghanamma.com
Texttest.org
Papers in Computer Science
TIMELINE: A Nuclear Crisis Unfolds In Japan : NPR
How does a NIC inside a VM get a MAC address assigned? - Hyper-V notes from the ...
7 Nutrients You Need More Of | Wise Bread
VirtMus - the modern music stand
How to Increase Productivity By Reordering Your Office | GrokCode
Internet Explorer 9 Compatibility Cookbook (Windows)
SQL Server backup and powershell - olivier pieri"s WebLog - Site Home - MSDN Blo...
Hiring for the Future ... Cloud Expertise is a MUST. - MICROSOFT GULF COMMUNITY ...
Project 2010 Help Content – Now Available for Download - Microsoft Project 2010 ...
Yet Another Wit Frontend in Launchpad
graphical
Cbeyond Small Business Phone Service & IT Solutions
Control Your iPad with Bluetooth Mouse (also Work on iPhone) | The iPhone and iP...
cydia
21 Ways to Excel at Project Management | Project Smart
Read only USB stick trick
InMaps: Visualize the different sources of your LinkedIn connections
3 Ways To Meaningfully Visualize Your LinkedIn Network
Amazon price tracker, Amazon price history charts, price watches, and price drop...
Delta pilot recounts overwhelmed Japanese ATC on day of earthquake - Flight Inte...
» Buying a Safe: Understanding UL Safe Ratings
Tax Tips for the Freelancer
Web Deployment with VS 2010 and IIS - Visual Web Developer Team Blog - Site Home...
YouTube - HOW SETUP DOMINO 8 0 WEB ACCESS
Derks.IT: Tools
Minerva - The Premier Home Automation Suite and Smart Home Software for Linux
Tutorial: Translating Scanned Docs | Linux Journal
My Green Paste, Inc.: Image File Execution Options: Good, Evil, Fun.
Image File Execution Options
Circuit Diagram
TinyButStrong - PHP Template Engine
JRecord
http://xkcd.com/radiation/
RKWard
100 Oldest .COM domain names
Font Association Part I: A Primer - Global Developer Blog - Site Home - MSDN Blo...
ForensiT Free Downloads
inhouse-web - Web based time recording and management application - Google Proje...
Wandora - WandoraWiki
Layering the info seems to be the differentiate.
Rustock Botnet Flatlined, Spam Volumes Plummet — Krebs on Security
Layer 8: NASA satellite snaps rare cloud-free emerald Ireland
EMC PowerShell Cmdlets – Where to start « « Virtu-AlVirtu-Al
How To Create The Ultimate Boot CD For Windows
Enterprise Configuration Database :: An Open Source Approach to Configuration Ma...
iTop - Home
NavalPlan - Open Web Planning: NavalPlan
marcelog PAGI: PHP Asterisk Gateway Interface OOP Client
The Virus Turns 40
youtube-dl
To 1433 or not to 1433...that is the question - CSS SQL Server Engineers - Site ...
Web Performance Tips: 10 JavaScript Best Practices - Dr. Doris Chen"s Blog - Sit...
PowerShell Using Threads in C# to Launch a Process and Read Output Streams - Not...
Domino Admin for Beginners -- Final
Corporate Social Media Policies: The Good, the Mediocre, and the Ugly | Fast Com...
Research Master - Asymptopia Software
A Brief History of Notable Internet Disruptions - Packet Life
PSPad - free unicode developer editor, handles near any syntax like HTML, PHP, X...
Official nuBuilder Home
GNU Telephony
How to Get and Give Honest Feedback | Wise Bread
Programming Bad Performance « The Network Therapy Blog
10 DIY Dog Toys You Can Make for Pennies | Wise Bread
Clearwell Streamlines the Legal Hold Process with the New Clearwell Legal Hold M...
How to Avoid Getting Hired | Wise Bread
Installing Visual Studio 2010 Service Pack 1 may prompt for source - Heath Stewa...
IE9 Shortcuts - thebeebs - Site Home - MSDN Blogs
Introspection – evaluating talent, part 1 - Terry Zink"s Cyber Security Blog - S...
It"s Pi Day. Do you know what 3.1415926535897932384626433832795 sounds like? -- ...
Counting and Creating Sums with awk
7 of the Best Free Graphical User Interfaces for R - Linux Links - The Linux Por...
{CWoC 2010} A Scripting Guide to Simulating Agent Workload on the Notification S...
Junkyard Jumbotron
din is noise
Compliance Risk Management: Ethical & Workplace Compliance Solutions
Texmaker (free cross-platform latex editor)
Google"s quest for eight habits of highly effective manager - The Economic Times
Cheap Car Rentals - AutoSlash
UrBackup - Client/Server backup system for Windows and Linux
Imaging Windows 2008 Server - Alex Tcherniakhovski - Security - Site Home - MSDN...
The emergency internet bunkers | Security | Features | PC Pro
Four more reasons to come to the PowerShell Deep Dive - Windows PowerShell Blog ...
Power Saving Options on SQL Server - Cindy Gross - Troubleshooting, tips, and ge...
How to check current installed version of PowerShell? - Brijs Blogging... Lookin...
Before you install Windows 7 Service Pack 1... - Random Musings of Jeremy Jameso...
Home automation and lighting control with Kinect - nitrogen"s posterous
Windows 7 Service Pack 1 install failures common? « Tim Anderson’s ITWriting
Change VM Video Memory « « Virtu-AlVirtu-Al
Japan"s Quake And Tsunami "Beyond Our Imagination" Eyewitness Says : The Two-Way...
teho Labs | KiCAD Tutorial
Vanilla: Analysis of a Domino NSD report - howto
Super Flexible File Synchronizer for Linux
Movgrab - Colum"s Code
Google Person Finder (消息情報): 2011 日本地震
Person finder for March 2011 earthquake
Zen Load Balancer V1 rc1 is released
LFT | freshmeat.net
Giada | your hardcore loopmachine by Monocasual
Partclone
Prime | Download Prime software for free at SourceForge.net
puddletag - Home
Automating Telnet and SSH - GitHub
DDMSence: An open source Java library for DDMS
MCG, the eMail Configuration Generator for procmail and mutt | Free Software Tip...
Seldom a love story: IT and end users - O"Reilly Radar
CloudSight -- by Backupify
ToneCheck
Lazygal
Third-party USB hubs may incorrectly disconnect after wake from sleep, causing s...
CSC Takes Cloud Seriously - Chuck"s Blog
Stream Spigot : Feed Playback
Enabling ESX SSH via PowerCLI « « Virtu-AlVirtu-Al
Paul"s Extreme Sound Stretch
thaberkern/timehive - GitHub
reCsvEdit
GPuTTY | freshmeat.net
wissel.net :: Who has access to your certifier?
Linux wireless LAN support http://linux-wless.passys.nl
QPaMaT - Password managing tool for Unix, Windows and MacOS X
dupeGuru Picture Edition - JPG, PNG, TIFF, GIF, BMP duplicate scanner
How do I use WinDBG Debugger to troubleshoot a Blue Screen of Death? | TechRepub...
Free Techie Blog
VMware Powershell – Find the number of Windows VMs | Free Techie Blog
Disable Nepomuk (Desktop Search) on KDE 4.4.2 Kubuntu Lucid 10.04 | Free Techie ...
Weekend Project: Set Up a Personal Wiki on Linux with TiddlyWiki | Linux.com
VirtualBox/SharedFolders - Community Ubuntu Documentation
Gestalt IT
Auto-Nooter 3.0.0 (1.1 only) - xda-developers
Near Field Communications: a technology primer
CCIE_RS_Quick_Review_Kit.pdf (application/pdf Object)
wissel.net :: Manager vs. Engineer
David Bilinsky - Thoughtful Legal Management
Speccy - System Information - Free Download
ISO Workshop - Extract, Backup, Convert, Burn your Disc Images
Fast Copy 2 speeds Windows file copying | Software News - Betanews
The Tech Convention Survival Kit | Tech Gear News - Betanews
This is Indexed
wfrog - Project Hosting on Google Code
Nixory - Antispyware tool for Firefox, IE, Chrome
TOMUSS: The Online Multi User Simple Spreadsheet
IE6 Countdown
List of GSM cell phone frequencies in use by country
List of Cdma Mobile Operators,Carriers and Networks By Country- Africa,Europe,Ca...
This I Believe | A public dialogue about belief — one essay at a time
NounProject
6 Inspiring & Funny Blogs You Should Read If You Are A Parent
Snippet Designer
More Young People Scorning Sex, Study Finds : Shots - Health Blog : NPR
"The more sensitive the questions, the more both sexes only want to talk to a woman,"
FAQ: How do I connect to a 32-bit SQL Server instance with ODBC in my 64-bit Win...
Reducing IT costs in education - Part II - Education - Site Home - MSDN Blogs
My database is X GB, how big should my log be? - Cindy Gross - Troubleshooting, ...
How to use Windows Explorer to view RAW files in Windows 7 x64 - Jon Gallant"s B...
T-SQL Query Script to monitor Memory Usage of a SQL Server Instance - Sakthi"s S...
PowerShell Script to Configure Search in SharePoint Server 2010 - Random Musings...
[PowerShell Script] PowerDbg v6.0 – Using PowerShell to Control WinDbg - Debuggi...
Mandatory parameters in PowerShell - Santiago Cánepa"s Blog - Site Home - MSDN B...
Updated Hyper-V Best Practice Analyzer - Virtual PC Guy"s WebLog - Site Home - M...
Technological Women
Script to Clear (and Save) Event Logs - Random Musings of Jeremy Jameson - Site ...
Work Smart Productivity Guides
How to deploy Windows 7 to 200,000 computers - Education - Site Home - MSDN Blog...
IT Showcase On: Windows 7 Deployment
iSqFt | The Leader in Preconstruction
Visual Studio 2010 Service Pack 1 installing for over 2 hours could be a sign of...
WoodITWork.com » HP Flex-10 DNS issue causing network outages
TechHead - VMware, Virtualization, Virtualisation, EMC, HP & Microsoft Related I...
fre:ac - free audio converter
EMC VNXe Storage Provisioning, Snapshot & Replication Demo | TechHead.co.uk
RecipeSource: Your Source for Recipes on the Internet
/downtimed/
Window Switch Home
Charting the upgrade path from DOS 5.0 to Windows 7 (video) -- Engadget
Python Tutorials for Kids 8+
Training - Microsoft Office
Tips on hard drive problems and troubleshooting
nsftools.com - The March 2011 Blog
Dual Core? No, We’re Not Ready. › AndroidGuys
Locking files for shared access
EMC VNXe Storage Provisioning, Snapshot & Replication Demo | TechHead.co.uk
3 essential skills for IT professionals - O"Reilly Radar
Testing Forms in PHP with SimpleTest
Automated testing of PHP forms.
TidBITS iPhone iPad iPod: Hands-On Details about the iPad 2 and iOS 4.3
ipad2
The ramblings of one curious guy | CuriousMitch
Speed up your Domino Administrator Client with a notes.ini setting | CuriousMitc...
Notes 7.x and Notes 6.x coexistence
issue still comes up with Domino 8.5.2 basic and full
Moving Outlook Contacts to Mac OS X Address Book « Lucas Chan :: Weblog
IBM is on Twitter, forty billion times. Who do I follow? | IdoNotes (and sleep)
Linux Backup Server: Refining Rsync, Passwordless Authentication - Rsync Backup ...
Nested-RAID: The Triple Lindy | Linux Magazine
Mac OS X Lion features hidden tribute to Steve Jobs
Microsoft IT Advisory Council
Real Help For Your Small Network - SmallNetBuilder
IBM - How to manually recertify an expired ID
Make Customers Smile in 7 Easy Steps with OTRS - Part 4 | Linux Journal
Cisco IOS Packaging Customer Q&A  [Cisco IOS Packaging] - Cisco Systems
IBM - FAQ: 64-bit version of Domino
What happened to versioning? - Word - Microsoft Office
Office Migration Planning Manager
quitesleep - Project Hosting on Google Code
One in six schools block Wikipedia - Education - Site Home - MSDN Blogs
86% of schools block Facebook 57% of schools block YouTube 14% of schools block Wikipedia
Khan Academy
Netbios Share Scanner Samba Windows Linux Unix
PowerShell Script to Configure the State Service in SharePoint Server 2010 - Ran...
javamelody - Project Hosting on Google Code
Oleksiy Gayda"s Tech Blog: Tip: Display current COM ports on the system
projects:start [Przemoc"s wiki]
Former Sun CEOs recount plan to buy Apple in 1995
The Death of BCC? — The NeoSmart Files
HIPAA Bares Its Teeth: $4.3m Fine For Privacy Violation | threatpost
Reducing IT costs in education - Education - Site Home - MSDN Blogs
Tim O’Reilly: The Future of Business Intelligence is Now - BizIntelligence.TV - ...
Microsoft Dynamics Project Readiness Assessment Quick Start - Microsoft Dynamics...
Cmdlet Help Editor V2.0 with Module Support - Windows PowerShell Blog - Site Hom...
America"s Debt: Get the Facts - BizIntelligence.TV - Site Home - MSDN Blogs
Azure Diagnostics and ASP.NET Health Monitoring - DavidHardin - Site Home - MSDN...
How about a bootstrapper package for SQLServer Express 2008 R2? « RobinDotNet"s ...
Mandatory parameters in PowerShell - Santiago Cánepa"s Blog - Site Home - MSDN B...
Eco-Cottages, the small modular home from Nationwide Homes
Rocio Romero, modern design and prefab architecture
Bloat - Overview - Bufferbloat
404 Tech Support: use-hp-web-jetadmin-to-simplify-printer-management
Disk Drill | freshmeat.net
Monit...
Using m4 with Nagios: Advanced Ideas « UNIX Administratosphere
m4 is back ;)
Penguin Pills
WoodITWork.com » HP Flex-10, ESX and Broadcom fun still continuing with ESX 4.1 ...
Wells Fargo Meeting Today With Philly Homeowner Who "Foreclosed" On Them (Here"s...
Bufferbloat: Sacrificing Latency for Throughput - www.enterprisenetworkingplanet...
How to Use Apple Magic Trackpad with your Windows PC
With Jolicloud 1.1, let’s reinvent the computing experience for millions - Jolic...
Visualized: Android activations mapped geographically, chronologically, breathta...
UNL | Lotus Notes
UNL | Lotus Notes - Backing Up Lotus Notes
Client
Secrets of a Mind-Gamer - NYTimes.com
Welcome to Open Library (Open Library)
Troubleshooting the 451 qq Temporary Problem
3TB Drives are Here | Linux Magazine
sqlninja - a SQL Server injection & takeover tool
Giovanni Tirloni » Blog Archive » Datacenter temperature and server failures
How to root a Nook Color to transform it into an Android tablet
[HOW-TO] Flashable Zip: Install Honeycomb to Internal Memory (eMMC) of Nook Colo...
CAI Networks - WebControl™ - Industrial Controller over TCP/IP network
Download details: Windows Server 2008 R2 Hyper-V Component Architecture (with Se...
SmartDeviceMonitor
SmartDeviceMonitor for Admin
Lotus Notes Tutorial - Lotus Notes and Domino Enterprise Education
The Geekery » Nagios, web scraping, and PHP as an agent
Conference Companion app suite poised to transform event experiences
Sayonara Japan | The 3 Month Checklist That Will Make Your Life A Whole LOT Easi...
Repatriating
Automate Windows Azure Functions with PowerShell Service Management CmdLets - Ig...
Partitioning & Archiving tables in SQL Server (Part 1: The basics) - Félix Martí...
Hyper-V CPU Scheduling–Part 2 - Virtual PC Guy"s WebLog - Site Home - MSDN Blogs
Microsoft Exchange RPC Extractor 1.0 is now Available - Office Interoperability ...
Resources for starting your Dynamic Data Center solution deployment - Microsoft ...
Computer Vision Syndrome (CVS) | American Optometric Association
YouTube - jeriellsworth"s Channel
Adafruit Industries, Unique & fun DIY electronics and kits
How I Learned to Stop Worrying and Love the SharePoint Topology Service - Beside...
What x86 hypervisor based virtualisation leaves for your application - c0t0d0s0....
WoodITWork.com » Scripting Flex-10 ESX design with PowerCLI
sapnote_0000674851vsphere50_WIN.pdf (application/pdf Object)
BayForce - SAP Consulting Services & Solutions
Bat To Exe Converter
TidBITS Networking: Should We Care about New Top-Level Domains?
Great diagram about icann structure.
WoodITWork.com » Flex-10 ESX design with simplicity and scalability: Part 1
WoodITWork.com » Flex-10 ESX design with simplicity and scalability: Part 2
Seth"s Blog: On pricing power
heaper is the last refuge of the marketer unable to invent a better product and tell a better story.
open-broadcast-encoder - Project Hosting on Google Code
Web Reporting solution for MySQL, MS SQL Server and Sybase | myDBR
Sphereless: Hackers, transparency, and the zen of failure
Hold Conversations, Not Meetings - Tony Golsby-Smith - The Conversation - Harvar...
Hold conversations
Exploratory treemap for Obama’s 2012 budget proposal
2010-Tax-Study-Final-Tax-Notes-PDF.pdf (application/pdf Object)
OpenShot Video Editor | Simple, powerful, and free video editor for Linux!
Design Your Facebook Fan Page With Pagemodo’s WYSIWYG Editor
799px-aspect_ratios_and_resolutionssvg.png (PNG Image, 799x600 pixels)
What Development Board to Use? (Part Two) - Hack a Day
USBConnect - AT&T BusinessDirect® | Premier Business Center
Nine traits of the veteran Unix admin | Unix - InfoWorld
Is Your Cloud System Safe From the Law? | Gov Monitor
ilektrojohn/creepy @ GitHub
How unique are your usernames?
LiveUSB MultiBoot
Moscrack
MyIT CRM - Development Team Website
testapi - Release: TestApi v0.6
OpenPublish - Open-Source Online News Publishing
My Arm’s Broke, Fix Me - Three Levels of Guidance in patterns & practices - J.D....
rsvndump - remote Subversion repository dump
Befriending Windows Security Log Events
What All This MD5 Hash Stuff Actually Means [Technology Explained]
Great images to explain to someone what a hash is.
Backup and Archiving | Symantec Connect
http://www.routemeister.net/projects/sipcalc/index.html
Understanding Blame : Bob Plankers, The Lone Sysadmin
When visibility is limited people tend to speculate.
VMware KB: Determining where growth is occurring in the vCenter Server database
Mallory: Transparent TCP and UDP Proxy – Intrepidus Group - Insight
BlackBerry Swiss Army Knife
Raleigh/Durham Business News | Triangle Business Journal
Download the bbc.closing.sites.archive torrent
Whisper Systems
Zenapp.blogspot.com
Whitepaper - Deploying SAP GUI on XenApp 4.5 » ocb - Citrix Community
Configuring Cisco to work with a Windows NLB Cluster - Internetworkpro
VMware KB: Sample Configuration - Network Load Balancing (NLB) Multicast mode ov...
VMware KB: Microsoft NLB not working properly in Unicast Mode
Unicast vs. Multicast - Original Posted Feb 21, 2005 - Cluster Help
Make Customers Smile in 7 Easy Steps with OTRS - Part 3 | Linux Journal
Make Customers Smile in 7 Easy Steps with OTRS - Part 2 | Linux Journal
Lotus Notes Diagnostics Version 2.9 (LND) has been released
IBM"s Lotus Notes/Domino Admin Tools v1.0 available
chan-sccp (revisited)
Vittorio Pavesi: NLB Unicast vs. Multicast
bluepot - Project Hosting on Google Code
The impact of IT decisions on organizational culture - O"Reilly Radar
The Sylinkreplacer tool for connecting SEP clients to a SEPM | Symantec Connect
GAP System for Computational Discrete Algebra
Cisco IOS Hints and Tricks: How did we ever get into this switching mess?
The New Domino Admin » Blog Archive » Lotus Domino SNMP: Solution when the SNMP ...
Jokosher
ASP.NET: Adding and Editing Database Entries | Mon 7 Feb 2011 | Blog | CodeStore
Lotusphere Podcasts
New Project: The Official Microsoft ASP.NET Site
Happy Software Engineer: Regular Expression To Match IPv4 Addresses
Troubleshoot Connectivity failures (18456 State x) with SQL Server - Sakthi"s SQ...
Teaching Kids Programming with SmallBasic video - Contagious Curiosity - Site Ho...
NicolTIP#021: hot to restart printer spooler service via PowerShell - NicolBlog ...
Gartner slams Cisco"s single-vendor network vision
When isn’t a loopback always reachable?
Tutorial: Arduino and GSM Cellular – Part One « t r o n i x s t u f f
IBM Lotus Domino Express - Small business email
Painless password management: The best free and paid tools | ITworld
Linux with badram Saves the Day! « The ERACC Web Log
Love the BadRam patch
sambascan2 | Download sambascan2 software for free at SourceForge.net
MFCMAPI
OutlookSpy - the Ultimate Outlook Developer Tool
What CIOs Really Want To Know About Cloud - Chuck"s Blog
KB11632-How to increase the number of email messages sent to a BlackBerry smartp...
KB04882-Best practices for installing service packs for BlackBerry Enterprise Se...
SQL Server and Hyper-V Dynamic Memory - Part 1 - SQLOS Team Blog - Site Home - M...
Recursive Loops - Computer Science Teacher - Thoughts and Information from Alfre...
heidelbergit
Introduction to PowerShell Training - Nick MacKechnie - Site Home - MSDN Blogs
Chemistry Add-in for Word
How Not to Respond to a Security Incident
Compare database schemas, synchronize database schemas with SQL Compare
Powershell to Automate SQL Compare | Home Of The Scary DBA
Cloudkick | Cloud monitoring and management tools
Linuxaria 12 open source books : Linuxaria
What’s the Internet? – Hilarious Video of NBC’s The Today Show in 1994 | Singula...
Installing the HP Universal Print Drivers on Citrix/Terminal Servers
J House Consulting — Application and Desktop Virtualization Specialist with Micr...
Acrobat and Reader 9.x (Windows): Deploying Acrobat/Reader installers and patche...
pepper
Welcome: Evergreen open source library system
KB18269-Duplicate desktop or unknown services are found in calendar or contact l...
BlackBerry - Smartphone Simulators
IT Salary Levels: Staffers vs. Superstars — Datamation.com
Compatible web browsers and PDFMaker applications | Acrobat
BURP - BackUp and Restore Program
Convert RAW Files to DNG with DNGConverter « Scribbles and Snaps
IBM - How to analyze questionable deletions in a Notes database
HDT
Tools « Business Model Alchemist
Business Model Canvas Poster
Tomboy : Simple note taking
OneNote-ish
WikidPad - wiki notebook for windows
OneNote-ish
NetXMS — Welcome
LensHero | DSLR Lenses
http://www.altanetworks.com/x3/tc_ships.html
Staffnote - Staff Attendance, Share Messages and Notes - Online Staff Attendance...
Windows PowerShell Survival Guide - TechNet Articles - Home - TechNet Wiki
Access to SQL Server Migration: How to Use SSMA - Microsoft SQL Server Migration...
Identify Slow Queries using MySQL’s Analysis Tools — DatabaseJournal.com
Bitflu
MSR Tools | when quality matters…
Average iPhone owner has 108 apps, spends 84 minutes a day using them
YouTube - Lego Antikythera Mechanism
Ancient astronomy: Mechanical inspiration : Nature News
Perl script to parse ADTS audio header - Matthew van Eerde"s web log - Site Home...
Alternative Software and Apps To Your PC (Windows, Linux), Mac, iPhone, Android,...
Converting VOC Audio Files from Digital Recorders « UNIX Administratosphere
VLANs and IP Routing on an Ethernet Routing Switch | Michael McNamara
802.1Q VLAN Tagging on an Ethernet Routing Switch | Michael McNamara
News Room - Trulia.com - Rent vs. Buy Index
The Importance of Provider Independent IPv6 Addressing
Three ways to fix the Cisco IOS Translating “xyz” Domain Server
Disable name lookup for cisco terminal
Moodle reporting | Matteo Redaelli
Oracle Solaris 11 Downloads
Oracle VM Templates
IBM - Download options for Notes/Domino 8.5.2 Fix Packs
Fix pack download links for 8.5.2 fp1
awstats_update_all - update all awstats sites in parallel processing
ScrumDo - Agile Story Management Web App
iTWire - LCA 2011: Cerf calls for "re-imagining" the internet
What Does a Good IT Manager Look Like? - Ethics and Trust - Opinions - LinuxPlan...
Andy"s House O" Blog: Troubleshooting IMAP - Slaying the beast
Troubleshoot imap via telnet
Wireless Sniffing and Jamming of Chronos and iclicker - Hack a Day
Protecting DBA’s secret - Microsoft SQL Server Migration Assistant (SSMA) Team"s...
Why does the name of my TEMP directory keep changing? - The Old New Thing - Site...
Why does my temp file get recreated each time?
Will Entriken: Classic and modern job searching tips
Areca Backup - Official Website
Duffbert"s Random Musings :: So everyone *doesn"t* intuitively understand Outloo...
Seth"s Blog: Eight Lessons from the life and work of Jack LaLanne
Gartner: Most CIOs have their heads in the clouds | IT Systems News - Betanews
Removing .cpan Directory
CPAN recovery
The Open Information Security Foundation - The Open Information Security Foundat...
How to perform an SQL Server Edition Upgrade - SQL Server Setup - Site Home - MS...
Can it work in the reverse direction?
Clonezilla - About
Clonezilla
How to Create Hyperlinks to support files in Microsoft Excel 2010 - Microsoft Le...
Top 200 Free High Quality Fonts of 2010 Part4 - Microsoft Lebanon"s Official Blo...
Top 200 Free High Quality Fonts of 2010 (Part 03) | MicrosoftFeed
Top 200 Free High Quality Fonts of 2010 (Part 02) | MicrosoftFeed
Top 200 Free High Quality Fonts of 2010 (Part 01) | MicrosoftFeed
How to Fast Copy without Clipboard in Microsoft Excel 2010 - Microsoft Lebanon"s...
Career Center for Job Seekers, powered by Monster.com - Microsoft Office
How to Get Full Headers - Lotus Notes
Finding headers in Lotus Notes 6 to 8 - View/Show/Page Source
Database Deployment Manager | Download Database Deployment Manager software for ...
offrss: Documentation
Offline RSS feeds for later offline reading.
key-mon - Project Hosting on Google Code
Display key presses onscreen
New Year"s Resolutions for Geeks Like Me - Geek Speak Blog
www.kmeckstein.com » Blog Archive » Speeding up the internet with pdnsd and squi...
SDL Tools
Download details: Attack Surface Analyzer BETA
Driving the Generational Shift in ERP - Microsoft Dynamics ERP "The Edge" Blog -...
Personal Change Control – My Etherealmind
It"s the Latency, Stupid
PowerShell : Getting the hash value for a string - XAML "for real" / XAML "dans ...
The Importance of Salary Negotiation
Notesboy
Install Single Sign on after it hasnt been installed previously
Powershell: Scripting Best Practices Analyzer remotely | vNinja.net
HP ProLiant MicroServer – Oh, it’s there! | vNinja.net
You Had Me At EHLO... : Introducing Remote Desktop Connection Manager (RDCMan) 2...
QNAP Systems, Inc. ( Download Center ) - Quality Network Appliance Provider
Seth"s Blog: Misjudging risk (and bad decisions)
Microsoft Outlook and Lotus Notes Crosswalk - Email - Information Technology - D...
Working between outlook and lotus notes?
Linuxaria Pcal – calendar from command line : Linuxaria
beets: the music geek"s media organizer
3 types of IT leaders: maverick, innovator, guarantor - O"Reilly Radar
X12 EDIFACT Mapping - Wikipedia, the free encyclopedia
Radio-Locator
What is BetterTouchTool?
Virtual Magnifying Glass 3.4
WoodITWork.com
242 Technologies
Explorer++ - A small and fast file manager for Windows
2G, 3G, 4G, and everything in between: an Engadget wireless primer -- Engadget
Understand Cellphone Technologies from AMPS to LTE
Sourcefabric
virtuallyGhetto: vGhetto Script Repository
William Lam"s excellent vmware work
MKSBackup Overview
How to Automate the Disk Cleanup Tool in Windows XP
Features, Architecture and Requirements :: MooseFS network file system - Moose F...
TaniDVR
egosoft.com :: View topic - [TC] Spike"s Walkthroughs
mission walkthroughs
Back up MySQL Databases with a Simple Bash Script - Linux Magazine Online
ExpressPCB - Free PCB layout software - Low cost circuit boards - Top quality PC...
NavalPlan - Open Web Planning: NavalPlan
ITDB - IT Items Database - Free IT Asset Management Software
Home | SFLphone - SIP/IAX2 softphone and VoIP client for GNU Linux
Does eating fruits and veggies make you more attractive? | MNN - Mother Nature N...
“In humans, the more red and yellow tones found in the skin, the more attractive the people were found to be.”
Verizon was "never in the running" for original iPhone
SQL Server - New Drives Use 4K Sector Size - CSS SQL Server Engineers - Site Hom...
Hate Your Job? It Could Be Your Fault | Wise Bread
Notesboy
Notesboy
Folder contents on archives getting deleted
IBM - How to rerun setup on a Notes 8.0 or 8.5 client
KB23745-Upgrading from Desktop Manager 5.0 to Desktop Software 6.0
With the release of Desktop Software 6.0 there are some features that will not be available which may affect some users.
Mini-Box.com: mini-ITX, nano-ITX, pico-ITX, mobile-ITX solutions
Minicomputer hardware
NotesHound - The world"s most powerful and affordable Domino developer tools
Field Bird - Android Tools
Intro to Circuit Bending - Hack a Day
osmius.com
Lots of good buzz words in this one.
Hand Crafted Sun Dried Fruit - Sun Dried Tomatoes, Sun Dried Mangos
NextWorth: Buy and Sell Electronics, Sell iPhone and Video Games, Recycle your g...
SellYourMac | Sell your used MacBook Pro, Mac Pro, iMac, Mac Mini, Powerbook G4,...
Dropping huge tables in MySQL without blocking I/O | StoiloBlog: everyday admini...
The work around is to create a hard link to the table’s .ibd file, drop the table, and then remove the link.
Why is IT governance so difficult to implement? - O"Reilly Radar
Introduction to Linux Cgroups — ServerWatch.com
How to copy data from a corrupted user profile to a new profile in Windows XP
How to ask a question
Another symptom of this error is getting the following answer: "You question has been answered a hundred times. Please use a decent search engine and/or search our archives before posting any future questions"
Reverting Changes in SVN (or: it"s not as easy as svn up -r) - Code Kills
svn cat -r $OLD $FILE > $FILE
HP-UX boot Guide
shutdown -h -y now
Network Security Toolkit (NST v2.13.0)
Free Security Alarm Monitoring Services, Home Business Alarm Monitoring
Free Alarm Monitoring
Understanding and extending the SharePoint PowerShell snapin - Beside the Point ...
W3Perl - Free logfile analyzer
Arduino The Documentary. How open source hardware became cheap and fun – New Tec...
Linuxaria The best way to move data : Linuxaria
rsync with ssh is the best performing option.
My Cold Life As a Temp UPS Driver Over the Holidays
Day in the Life of a UPS driver
astGUIclient - VICIDIAL
Dialer for Asterisk
KnowledgeTree Document Management Made Simple
USGBC: LEED for Retail
LEED for Retail
Putty – Fixing Right Click Paste – My Etherealmind
Intro to Nested-RAID: RAID-01 and RAID-10 | Linux Magazine
Great article about nested raid
Whose house is of glasse, must not throw stones at another. « jg"s Ramblings
organic fertilizer: powershell: naming functions and cmdlets
Houcem HACHICHA"s Blog: How to create and setup a virtual machine using VirtualB...
Enterprise Support - Symantec Corp. - CleanWipe is NOT recommended to be run fro...
It is NOT suggested that the CleanWipe tool be run remotely using a Remote Desktop, PC Anywhere, VNC or other software based remote control program. This is because there are Symantec network drivers that are removed, and the original network drivers for the Network Interface Cards (NICs) are replaced. If there is an error while running the clean wipe tool, it could render the NICs useless until the drivers are reinstalled. If the drivers need to be reinstalled, then you will need to be either physically at the computer or use a KVM over IP device, iLO or other mechanism to connect to the server.
Andrew Gee » GPX Viewer
Viewing Deleted Active Directory Objects Using LDP - Federated Infrastructure - ...
AwesomeBox | Open-Source Real-Time Pitch-Correction (is that enough hyphens for ...
Licorize - for the web worker tribe
Social Book Marking at its finest
Revolution Jacket from SCOTTEVEST/SeV - Revolution Jacket with Hidden Pockets
Tax Tables
The Daily Admin
good collection of IT geekery
IOGraphica — MousePath"s new home
skeletek
How to create a Windows PE boot disc - computer help forum
McAfee Communities: Content Does Not Match Content Type
Content Type mismatching at its finest
Seth"s Blog: Making meetings more expensive
DB Sanity
TeamLab – Create Your Enterprise Portal in the Cloud for Free
How to make a basic WinPE 2.0 CD - MSFN
Remote (in band) configuration tips – My Etherealmind
Recycle IIS Application Pool": 0x80070005 Access denied - Deploying sharepoint s...
Essential Project–Open Source EA Metamodel - Inside Architecture - Site Home - M...
2010 Investment Returns by Asset Class » My Money Blog
The GAdmintools Project
WS6Z"s hamtools
Chaosmap | freshmeat.net
Half Moon, Full Wallet: Free Online Yoga Videos | Wise Bread
Top 50 Programming Quotes of All Time | TechSource
Starting Jobs in Powershell using Job Name - SQL Server Agent Team Blog - Site H...
3 Useful Scripts To Modify Your Proxy Settings For Internet Explorer
I, Cringely » Blog Archive » And Then Along Comes Larry…. - Cringely on technolo...
XODA - the KISSed Document Manager
adamdoupe/WackoPicko - GitHub
WackoPicko is a vulnerable web application used to test web application vulnerability scanners.
Common Errors in English Usage
iTunes: Back up your iTunes library by copying to an external hard drive
Keith Hill"s Blog - Windows Live
Mailbag: Should I re-install the versions of the .NET Framework in a specific or...
DB Mirroring Tips - Esoteric - Site Home - MSDN Blogs
The Semicolon Wars | Lambda the Ultimate
The Myths of IT – Part 2 « The Network Therapy Blog
The Myths of IT – Part 1 « The Network Therapy Blog
Interleave: Open source Business Process Management software
wissel.net :: Golden Rules for Domino Adminstrators (courtesy of Manfred Meise)
shedskin - Project Hosting on Google Code
Building a World Class Team - A Glossary of Roles - InsideRIA
Building a World Class Team - Implementing Code Review in an Agile Environment P...
Building a World Class Team - Implementing Code Review in an Agile Environment P...
Building a World Class Team - Tightening Development Workflow Part 3 - InsideRIA
Building a World Class Team - Tightening Development Workflow Part 2 - InsideRIA
Building a World Class Team - Tightening Development Workflow Part 1 - InsideRIA
Creating a Pathway to Action - InsideRIA
Constructing a Team Vision - InsideRIA
Building a World Class Team - A Holistic View Part 5 - InsideRIA
Building a World Class Team - A Holistic View Part 4 - InsideRIA
Building a World Class Team - A Holistic View Part 3 - InsideRIA
Building a World Class Team - A Holistic View Part 2 - InsideRIA
Building a World-Class Team - A Holistic View Part 1 - InsideRIA
Building a World Class Team - Sharing Knowledge Part 2 - InsideRIA
Building a World Class Team - Sharing Knowledge Part 1 - InsideRIA
Where users of Avaya and Nortel connect.
The SQL Server 2008 R2 builds that were released after SQL Server 2008 R2 was re...
Versions of SQLSERVER2k8r2
wissel.net :: Notes / Domino upgrade cheat sheet
X3 Terran conflict (X3TC) on X3TC.RU: knowledge base, properties of all ships, m...
Stubborn Tech Problem Solving: quote-count: A debugging tool for shell scripts
How to pronounce ASUS (video) -- Engadget
How to pronounce ASUS -- hint youre doing it wrong.
NSA considers its networks compromised
Debora Plunkett, head of the NSA"s Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be considered completely and utterly impenetrable - not even that of the NSA.
HOWTO - virtualbox as a service on Windows (srvstart.exe) (View topic) • virtual...
Good magic
Null Logics Software - Windows Service Commander - Manager all Your Windows Serv...
SQL SERVER – Start SQL Server Instance in Single User Mode « Journey to SQL Auth...
Finding and Installing Windows Saplog.ini File
Magical new things with 710 and 720 guis
Using Active Setup to Deploy User Based Settings via an MSI
Rivendell Project Home Page
Outlines and Templates - Proposal Development - Tufts University
The Ji Village News » SQL Server 2008 R2 unattended installation via configurati...
Merging Two Domino Databases With Folders :: Dec"s Dom Blog
SQL Server Version Database
Derek Seaman"s Blog: SQL 2008 R2: Unattended Install Script (Part 2)
SQL: SQL Server 2008 Express Missing ConfigurationFile.ini « Nick Olsen"s Progra...
Silent install of SQL Server 2008 « Mahesh’s brain droppings
Locale IDs Assigned by Microsoft
1033
How to make SVN ignore some folders" contents.
Silent install, repair and uninstall command lines for the .NET Framework 4 - Aa...
Aaron comes through again.
Putting /etc Under Subversion (SVN) | BarryODonovan.com
Making magic happen with 1 commit at a time
Index — Python Tips, Tricks and Hacks
Leadership Blogs - J.D. Meier"s Blog - Site Home - MSDN Blogs
Visual Studio 2010 SP1 Beta IIS Express Integration - Visual Web Developer Team ...
Generating Proxies for Silverlight accessing a Silverlight-Enabled WCF Service -...
SE-Explorer : Free portable file manager with lots of build-in viewers, archive ...
X3 - Terran Conflict: Online Complex Construction Calculator
egosoft.com :: View topic - The Ultimate X resource and guides list - last updat...
VisualDB | Download VisualDB software for free at SourceForge.net
Visualize your Postgresql database - VisualDB
Severed Fifth | Releases
How to Teach Yourself About Project Management… | Michael Greer"s PM Resources
BerliOS Developer: BerliOS Developer Services
Quotista.com - shared quoting experience
Century Gothic Saves More Ink Than Ecofont : TreeHugger
A more effective ecofont
Security Blanket Technical Blog: Tips for Securely Using Temporary Files in Linu...
Active Directory SPN Mappings and Kerberos : Brian Desmond"s Blog
Doodle: easy scheduling
Synergy - Welcome - Synergy
The Nubby Admin || The blog of a nublet SysAdmin
Life As A Sys Admin: Best Networking Tweaks for Linux | Network World
Clonezilla-live download
ivarch.com: RT Flag Updated
ivarch.com: RT Achievements
ivarch.com: RT Email Import
Armitage - Cyber Attack Management for Metasploit
True Knowledge - the internet answer engine
ShareEnum
Seo Panel: World"s first open source seo control panel for multiple web sites
The gWaei Project Homepage, Latest Release 1.4.3
Date and Time Math with PowerShell : Brian Desmond"s Blog
appscale - open source Google App Engine
Minibis - CERT.at
Hayward"s Free Intranet Employee Photo Directory → An Open Source Django Project
NiX | freshmeat.net
PST, CST, EST, and JST from the Regex Master
BambooInvoice: Simple, Beautiful, Open Source, Online Invoicing
FreeRADIUS: The world"s most popular RADIUS Server
Swingbench
Building wireless IDS system using open source | Softwink, Inc [800-538-9357]
SmartCam | Download SmartCam software for free at SourceForge.net
OSForensics - Download
Nfsight
Insults
pachube :: connecting environments, patching the planet
nrh"s pogo at master - GitHub
Tiny Core Linux, Micro Core Linux, 10MB Linux GUI Desktop, Live, Frugal, Extenda...
» Enable Lotus Notes notes:// protocol in mediawiki itlivewire dev blog
Mutil
Sysconfigtools | Sysconfigtools
QUATTOR: QUattor is an Administration ToolkiT for Optimizing Resources
SimpleDiagrams
DNSViz | A DNS visualization tool
Portland Pattern Repository
ICS Resource Center
IRODS:Data Grids, Digital Libraries, Persistent Archives, and Real-time Data Sys...
Gluster.org Community Website | GlusterFS is a cluster file-system capable of sc...
It"s clamfs chowder time!
FireShepherd
AWS Free Usage Tier
The Gosu Programming Language
Validate Follower
http://www.nomadix.com/
Chef - Opscode
DevOps - Wikipedia, the free encyclopedia
Black"s Law Dictionary
troysblog
Firefox Extension BlackSheep Detects And Protects You From Firesheep
Saving money by saving power - how Microsoft IT rolled out desktop power managem...
ProjectForge
Alice.org
SkySQL » Welcome to SkySQL, the alternative source for software, services and su...
FreeTDS.org
google-mysql-tools - Project Hosting on Google Code
mysqladmin - MySQL Admin Tool
SETroubleShoot Overview - setroubleshoot - Trac
MySQL Preacher
Fun with mysqlslap benchmarking - Everything MySQL
DNSSEC Debugger
What is the System Update Readiness Tool?
Security Intelligence Report (SIR) vol.9
Office 2010 Deployment in the Enterprise – Part 1 - Pushkar"s Office Blog - Site...
SQL Server 2008 and R2 Cluster Best Practices - pamitt - Site Home - MSDN Blogs
Performance Analyzer 1.0 for Microsoft Dynamics - Microsoft Dynamics NAV Team Bl...
Database Mail – Validating your SMTP mail server configuration using powershell ...
mod_pagespeed Overview
ssldump home page
Make Customers Smile in 7 Easy Steps with OTRS - Part 2 | Linux Journal
Make Customers Smile in 7 Easy Steps with OTRS | Linux Journal
Resource page for reposurgeon 0.3
Download the Free Linux Foundation Publication: Self-Assessment Checklist | Linu...
Ubuntu Crack & Hack Win7 User Passwords & Files | Linux Blog
Download details: Microsoft Network Monitor 3.4
Logos in Inkscape | Packt Publishing Technical & IT Book Store
FrontPage - The Wireshark Wiki
Likewise Open Source Software that Authenticates Linux, Unix, and Mac systems wi...
Cleanup User Objects with Invalid MailNicknames : Brian Desmond"s Blog
Macintosh Security Site - Security for Mac Platform MacOS X Security Firewalls D...
An example regex and mini-tutorial -- finding multiple strings (Page 1) - Tips a...
USG DNSSEC Deployment Status
Shareaholic for Firefox - The best way to share, tweet, bookmark, save and e-mai...
MPE to HP-UX Cross-Reference
jessyink - Project Hosting on Google Code
Makecheque: A Check-printing Tool
plowshare - Project Hosting on Google Code
The Internet Services Disruption « Ray Ozzie
Stop spam with the Anti-Spam-SMTP-Proxy (ASSP)
AFICK (Another File Integrity CHecker)
Apophysis.org
Performance & Security for Any Website | CloudFlare (Private Beta) | Home
CLI Companion in Launchpad
HowTo: Use Bash Parameter Substitution Like A Pro
OCS Inventory NG - Welcome to OCS Inventory NG web site !
Howto: Using ExtPart to Expand Windows Server 2003 VM Boot Volume - h0bbel.p0gge...
Drivers and Downloads - extpart
DriveSaver™ — The First Online Hard Disk Drive Simulator
Find_SSNs - Search files for U.S. Social Security or Credit Card Numbers | IT Se...
digiKam - Photo Management Program | Manage your photographs as a professional w...
LemonPOS | Home
wissel.net :: Create an Enterprise Event Calendar on the Cheap
Resource page for ssh-installkeys 1.5
cb2Bib: Overview
DIASER - Main
Gforge: gPM: Project Info
Tosca, open source request-tracking system
Shovelglove: The Sledgehammer Workout
Master lighttpd – the lightweight alternative to Apache | Linux User
Strange packet: "daylight rekick", anyone?
Welcome to VRC
REDCap
Do you know about Lotus Notes 8.5.2 managed replicas?
Tokyo Hackerspace – Akihabara Station Video Tour - Hack a Day
Mac 101: Preparing your old Mac for sale or recycling
Windows 2008 R2 Performance Monitor – Processor Information Counters have replac...
Home - Process Hacker
A self elevating PowerShell script - Virtual PC Guy"s WebLog - Site Home - MSDN ...
Decrypt secure strings in PowerShell - Beside the Point - Site Home - MSDN Blogs
Download details: Microsoft Web Application Configuration Analyzer v1.0
Paper processor
Implementing two Factor Authentication on the Cheap
duplicity: Main
baculafs - Project Hosting on Google Code
ttyutils
iexploder - Project Hosting on Google Code
DigiFAIL.com - Bluelog
Tutorials and How-tos/Backup with rsync and rsync.net - ExcitoWiki
CiviCRM | CiviCRM Community Site
constituent relationship management solution
Orange Leap - Where nonprofits rise and shine
LifeType | Open Source Blogging Platform
Booting HP-UX
RT-Nagios gateway | Cedval"s website
Salecker.org - Software - kismon - english
Getting the Most Out of Salary Comparison Sites | Wise Bread
GCreep: Google Engineer Stalked Teens, Spied on Chats (Updated)
Risk and Health Assessment Program for Microsoft SharePoint Server (SPRAP) - New...
Elearning open source platform, LMS and LCMS
PuTTY Tray
KiTTY - Welcome
gource - Project Hosting on Google Code
Using ffmeg to batch convert cd audio files to mp3
CLOC -- Count Lines of Code
cx_OracleDBATools
Download the free Access 2010 Migration Guide - Microsoft Access - Site Home - M...
SAP Landscape Management with SQL Server Policies - Running SAP Applications on ...
Modifying Configuration Redirection Settings using PowerShell - Robert McMurray"...
How Systems Fail (and Principles of Prevention) « UNIX Administratosphere
Licensing changes in SQL Server 2008 R2 - Esoteric - Site Home - MSDN Blogs
The .xz file format
SMRadius : HomePage
SharePoint 2010 Solution Deployer–V1.1 - SharePoint Infrastructure....From the f...
Chapter 38. The Samba Checklist
NCurses Disk Usage
Disk Cleanup Tool in Windows XP
Sux
iTerm
Manager Tricks: How to message annual Review - Bhola Meena"s Tech Diary - Site H...
Login failed for user "sa" while installing SQL Server 2005 - Sakthi"s SQL Serve...
android-wifi-tether - Project Hosting on Google Code
Whyteboard: Open Source Paint Program
Visual Disk Test (VDT)
iNum - One number for the world - Home
The OpenBTS Project
How to make a Cosmic Wallpaper in GIMP | Scott Photographics | Free Photography,...
Multithreaded FLAC to mp3/vorbis/FLAC encoding script
Making an executable take pipelined input in PowerShell | Farblondzshet in Code
Visual Round Trip Analyzer - Experience is what you get when you don’t get what ...
How to Repair Corrupted Excel Files « the back room tech
videokiosk - Project Hosting on Google Code
Easy GUI Backup Solution, Bare Metal Restore, Open Source GPL Recovery
Open Source Billing and Rating Software | jBilling
PDFpirate, (Soon) One Stop Shop for All Your PDF Needs
Expatistan, expat life made easy
Fix Task Manager Problems in Windows « the back room tech
Stupid tar Tricks | Linux Journal
Concordance
The New Domino Admin » Blog Archive » Lotus Notes 8.5.1: Death By PowerPoint … a...
drupowa | Download drupowa software for free at SourceForge.net
Winmail.dat Reader - Free winmail.dat converter to open files sent by Outlook an...
Matterhorn: Open source lecture recording tool - The H Open Source: News and Fea...
Campsite : Sourcefabric
BugHotel Reservation System | Hotel Booking System - Home
Centralized Logging with a Web Interface | Linux Journal
SymKat» SymKat | SSH: Tips And Tricks You Need
GoVirtual: The Online Destination for Virtualization Researchers and Academics
Ed Brill - Lotus Notes 8.5 client version-to-version comparison
Amazing News: Inside AT&T"s National Disaster Recovery Batcave: Who AT&T Calls W...
Welcome to GNS3 Vault
Revolution Wi-Fi
Revolution Wi-Fi: Virtual APs Will Make You Look Like a Fool
DentBetty - Get competing estimates from body shops by uploading photos
eat the seasons | food seasons
log2timeline
How to recover from USB errors? (Part 1) - Microsoft Windows USB Core Team Blog ...
Cloud security 101: Start cramming now - Architects Rule! - Site Home - MSDN Blo...
Sharepoint 2010 Administration ToolKit Released - MOSS Attacks - Site Home - MSD...
Everything iTunes [Windows Version]
openpom - Project Hosting on Google Code
Free CCNA Workbook
Undiscovered Features: Thermostat
organic fertilizer: powershell: generating a range of test users
Qualys Community: BlindElephant - BlackHatUSA2010 - Slides (Version 2)
Configuration Reference : The Official Microsoft IIS Site
Cisco IOS Hints and Tricks: Custom-written DNS servers: Learn to love them
CCNP ROUTE: Official Study Guide or Foundation Learning Guide? - Packet Life
The Ancient and Noble Art of Troubleshooting | My Etherealmind
Samurai Programmer.com - PowerShell: Restoring a whole heap of SQL Databases
An Educators Guide to School Networks
cvechecker | A local CVE checker tool
Country Profiles - Guides to Culture, Etiquette, Customs and Protocol
Writing optical discs using IMAPI 2 in powershell - OpticalStorage - Site Home -...
PowerShell for Failover Clustering: Find Clusters in a Domain - Clustering and H...
Find out how much space is used / can be used by a virtual machines virtual hard...
Downgrading SQL Server Enterprise Edition to Standard Edition - Nice things insi...
Who Invented the Pascal Program?
Main Page - Process and Service wiki
Lyrics by song, album, or music artist - LyricWiki
Debian Live Studio
Device Naming Conventions - Terry"s Blog
The Guerrilla Guide to Interviewing - Joel on Software
» How to Prepare for Losing Your Job
oracle monitor with zabbix
Automating SharePoint 2010 Install on Windows 7 - Ram"s Blog - Site Home - MSDN ...
Things to do in Tokyo - Time Out Tokyo
How do spammers get my email address? - Security Tips & Talk - Site Home - MSDN ...
Download the Latest Microsoft Security Intelligence Report - Official Microsoft ...
Download - Spell, Style, and Grammar Checker for OpenOffice
CloudAudit
The EFF SSL Observatory | Electronic Frontier Foundation
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1 FP4: Fix Pack 4 Install...
Voxitas | Home
Main Page - Win32 Perl Wiki
Oracle-L: RE: Oracle 9 Agent not starting
Free Script: User Profile Domain Migration with SetACL | sepago
Automated IOS Updates - Terry"s Blog
Mikogo: Free Remote Desktop, Web Conferencing & Online Meetings
expect-lite
The Essential Components of the Good Life » My Money Blog
CheckInstall Homepage
Project Plans in a Nutshell - J.D. Meier"s Blog - Site Home - MSDN Blogs
Don’t mess with the system databases in SQL Server, or Error: 916 - Carpe Datum ...
Home | TurningArt
Welcome to Index Engines
Seth"s Blog: A post-industrial A to Z digital battledore
Unleashing the Ideavirus
The News is Broken :: General :: Latest Project
Longform.org
StaticNAT » Blog Archive » Do Not Social Engineer Yourself out of Clients or you...
openSIPS | Main / HomePage
Car Service, Limo, Limo Rentals, Limousine Services, Airport Limo | LimoRes.net
EU3 Wiki
Andy"s HousEverything old is new again - The Handheld Warse O" Blog:
Wireless Out-of-Band Console Access with Opengear"s ACM5000 - Packet Life
How to make see-through text to image in GIMP | Scott Photographics | Free Photo...
LVM, RAID, XFS, EXT3 tuning for small files parallel I/O on Debian / Linux blog ...
Systems Administrators Changing Roles
Three Sysadmin Rules You Can’t (And Shouldn’t) Break
.:: OpenNebula: The Open Source Toolkit for Cloud Computing ::.
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1 Upgrade: Solution to th...
Kensington"s Laptop Locking Station is a thief"s worst nightmare... maybe -- Eng...
http://liblearn.osu.edu/tutor/jscript.html
Powershell Remoting with SQL Server « Home of the Scary DBA
» How to Recover A Stolen Identity
The Blog of Helios: The Future of IT...Here They Are.
Writing Better Shell Scripts – Part 2 | Innovations Technology Solutions | Blog
Writing Better Shell Scripts – Part 1 | Innovations Technology Solutions | Blog
A Deadly Linux/UNIX Command in Action (Video) | TechSource
The 7 Deadly Linux Commands | TechSource
Seattle OnHold Music
Awesome Science Teacher Resources
NetStress :: Network Benchmarking Tool
Free SQL Server 2008 R2 Online Training Course Available on Channel9 - US ISV Ev...
IIS Developer Express Overview : Using IIS Developer Express : WebMatrix Beta : ...
ASP.NET Perfecto - Taking a quick peek at the performance of your ASP.NET app - ...
FAQ Week for NLB: Monday - Clustering and High-Availability - Site Home - MSDN B...
WIKINDX 3
Argumentative
Endpoint Encryption User Guide
McAfee Communities: Dan Larson"s McAfee Blog: Unofficial Quickstart Guide for Mc...
CMU Sphinx - Speech Recognition Toolkit
Colin: Administration with Perl in a Windows Environment
ONI Home Page | OpenNet Initiative
Power tip (igo, Kensington, Targus etc...) exchange thread - Page 22 - FlyerTalk...
FAQ Week for NLB: Wednesday - Clustering and High-Availability - Site Home - MSD...
Microsoft Security Advisory (2286198): Vulnerability in Windows Shell Could Allo...
Intel vPro PowerShell Module - Windows PowerShell Blog - Site Home - MSDN Blogs
Presentation Links: SQL Server Performance Tuning (Quest) - Carpe Datum - Site H...
PowerShell and Extended Properties - Carpe Datum - Site Home - MSDN Blogs
Time Tracking | TaskFreak! web based task manager and todo list, project managem...
OpenStack Open Source Cloud Computing Software
SchemaCrawler - SchemaCrawler
Cisco IOS Hints and Tricks: Server virtualization has totally changed the Data C...
16 Enterprise Architecture Strategies Learned The Hard Way - Linda Chong"s Blog ...
REMnux: A Linux Distribution for Reverse-Engineering Malware
Sagan from Softwink, Inc [800-538-9357]
Principles 1: The Essence of Driving – A Crash Course in Project Management - Iv...
Observium :: Network Monitoring and Observation Main/Home Page
Customising Office 2010 before deployment
Damn Vulnerable Linux - The most vulnerable and exploitable operating system eve...
Installing OpenWrt on Seagate DockStar HOWTO
Racktivity: insight and control for your data centre - Home
Laptop Makers Pushing Paid Support Instead of Answering Questions
Tech Support Showdown 2010 - Tech Results Compared
Characters in the local part of a mail address
BES users and Out Of Office issues and fixes | IdoNotes (and sleep)
Tokyo University"s Grape-DR supercomputer is a tangled green powerhouse -- Engad...
Duffbert"s Random Musings :: So just how secure is your Domino server from attem...
Ask a Manager
Bitcoin P2P Cryptocurrency | Bitcoin
Continuous integration with Buildbot
Buildbot
Free video lectures | Online Courses | Video Lessons | Lecture Videos | Tutorial...
Buildbot
dl: download ticket service
Kindlerama
The Ware Tetralogy, four novels by Rudy Rucker
Kindle software versions v2.5.3, v2.5.4, v2.5.5 – What are they? | TeleRead: Bri...
VMware VI Perl Probleme unter Debian Lenny [wiki.secured.de]
Possible installation problems with .NET Framework 2.0, 3.0 and 3.5 hotfixes tha...
What is a PM? - J.D. Meier"s Blog - Site Home - MSDN Blogs
Program Manager
What Do The URL Domain Extensions Stand For & Why Are They Needed? [In Case You ...
Unattended Ubuntu Installations « UNIX Administratosphere
Ten Things You Need to Know About Design - Canadian Developer Connection - Site ...
CTT - Charity Technology Trust - A charity that helps charities to use technolog...
Using Ketarin to Automatically Update Software Packages | deranjer - A Productiv...
Greenshot - a free screenshot utility optimized for productivity
How to Hire a Contractor Without Getting Hosed
» How to Dry Fresh Herbs
Open Validator - Web Conformance Tool
MoCo Monitoring and Control System
V3RITY Software - Breach Investigations and database forensics
The Archivist By Mix Online
How Microsoft IT Approaches Organizational Change Management | Media | TechNet E...
Merge Replication Capacity Planning - REPLTalk covers Using and Tuning SQL Repli...
HYPER V and SYSTEM CENTER
Foundstone Network Security - Risk Management - Free Tools
Dive Into HTML 5
HTML5Rocks - Home
debianadmin.com Scan Report - URLVoid.com BETA
gnomeDIAicons - Beauty icons on your diagrams
New free e-book every month from the University of Chicago Press!
picogen.org
Your Employee Handbook :: Personnel Policy Manual and Editable Template
LinOTP 2
PowerShell for Failover Clustering: Webcast Follow up - Clustering and High-Avai...
Why Aren"t You Agile? - InsideRIA
Real-time Sunlight Wallpaper - Home
OpenPSA - Home: Welcome to openpsa2.org
F.lux: software to make your life better
Update CPAN modules - Kiffin Gish dot Com
perl -MCPAN -e "CPAN::Shell->notest(install => CPAN::Shell->r)"
Understanding Software Assurance - Microsoft Office 2010 Engineering - Site Home...
Volume Activation Tips and Tricks - Microsoft Office 2010 Engineering - Site Hom...
Why Office? “Our business runs on Excel.” - Microsoft Office 2010 Engineering - ...
DennisKennedy.Blog » My Latest ABA Journal Technology Column Introduces the Mobi...
Ksplice » Attack of the Cosmic Rays! - System administration and software blog
Flash Crash Analysis - May 6"th 2010 - Part 1 - Empirical Analysis - Answers - N...
50ms is approximately the time it takes light and electronic communication to travel from New York to California and back.
OpenSCAD - The Programmers Solid 3D CAD Modeller
My Kerberos Checklist… - CSS SQL Server Engineers - Site Home - MSDN Blogs
CHDK Download - build 0.9.9, revision #905
Planning migration to Office 2010 - FE blog - Site Home - MSDN Blogs
SAP on Windows and Anti Virus Scan - SAP Global Alliance Technology Team Blog - ...
$daniele.work.ToString() - Site Home - MSD...
$daniele.rant | Out-Blog
DeepPeep: discover the hidden web
Technical Solutions InputSystems Blog: .NET Framework 3.0 Service Pack 2 Update ...
FBI says new phone scam targets your bank account
BBLISA - Back Bay Large Installation System Administration
LOPSA-NJ
Dove - Document Distribution Software
Learning Powershell « Home of the Scary DBA
Visio Guy » Remove Backgrounds From Images With Office 2010!
MuseScore | Free music composition & notation software
Free Fax • Free Internet Faxing
dzo | Download dzo software for free at SourceForge.net
Californian Accused Of Sex Extortion Via Computer : NPR
Wizard Wall Portable DryErase Whiteboard
iOS Opt Out
Vmware ESXi 4 Log Files | Xtravirt
Obtaining an upgrade or update for Symantec AntiVirus Corporate Edition or Syman...
10 Reasons to Upgrade SAP systems to Windows 2008 / Windows 2008 R2 - Running SA...
Bluetooth Radar
Synology Inc. • View topic - Simple WDIDLE3.EXE Setup
UNISA Chatter – Operating System Concepts: Part 12 … Security - Willy"s Cave - S...
VODO presents: Pioneer One
XHTML/HTML Debugger (xhtmldbg)
unknowndevices - Project Hosting on Google Code
Home | OpenOffice.org Templates
sobees - sobees
Download details: Microsoft Baseline Configuration Analyzer 2.0
googlecl - Project Hosting on Google Code
DNS Sinkhole ISO Availabe for Download
SQL Server 2008 R2 Best Practices Analyzer is now available - Microsoft SQL Serv...
PowerShell for Failover Clustering: CSV Free Disk Space (and other info) - Clust...
Forumlogr.com - Connecting you to the best threads - 59 people online
SQL Load Test
E-mail ghettoVCB Backup Logs for Windows & VMware ESX/ESXi
Home Automation with ADSL, I-mode, Wap...
DC++ your files, your way, no limits
Opsview | Business-Powered System and Application Monitoring
Should IT Managers Assume Good Intentions When Developers Mess Up? — Datamation....
His philosophy: always first assume good intentions.
Wakodi | Download Wakodi software for free at SourceForge.net
Disconnect Between Legal and IT Getting Worse, Recommind Survey Reveals | Other ...
Rise of the Legal Support Manager
Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWAS...
7 Free, Open Source Tomes For Your Edification
LogicalDOC Document Management - Document Management Software, Open Source DMS
Sprint IP Network Performance
20 Windows 7 quick tips and tricks for IT admins - The blog of Rob Margel - Wind...
What Font is
Ultimate Deployment
Electrical What ?!
Jeffrey Miron » The Book
The SQL Server 2008 Data Collector: Part 3 - Dassault Systèmes ENOVIA V6 on SQL ...
Improve Your Site’s Search Ranking - Expression Web team blog - Site Home - MSDN...
You may see your IIS 6.0 applications failing to respond after you install Micro...
msgoodies: Get-Line and Got-NewJob
DBCC CHECKDB / Database Integrity - Cindy Gross - Troubleshooting, tips, and gen...
CloudHarmony
ITDB - IT Items Database
What is JavaScript and How Does It Work? [Technology Explained]
How to back up and then restore printers when you upgrade from Windows Server 20...
BBC World Service - Documentaries
swaks - Swiss Army Knife SMTP
Carnegie Mellon NetReg/NetMon
Cable Labels & Wire Markers for Laser Printers
Remus Information Management
New Data Center – Where have I been? | Michael McNamara
Green for Your Garden—and Your Wallet! | How to Get More Plants at No Cost | Pho...
A VC: MBA Mondays
Best Houseplants to Improve Indoor Air Quality « Pro"s Who Know
Dual Monitor Tools - Home page
Less known Solaris features: hxbt - or: WAN emulation - c0t0d0s0.org
Batch File to Local Administrators a Sysadmin Login in SQL Server - David Browne...
SysMT - SAP system maintain calendar
10 Tools To Add Some Spice To Your UNIX Shell Scripts
Cloud computing saves L.A. millions in IT costs - O"Reilly Radar
BigAdmin HCL: Sun Device Detection Tool
How to completely remove Symantec Antivirus (without entering password) [GluekWi...
HP Alumni Association
7 Sites With Laptop Teardown Guides & Other Laptop Repair Resources | Technibble
Google"s front page gets an image: are doodles dead, and what"s the purpose? | T...
AT&T website scraped to reveal iPad 3G owners" email addresses
AV Exclusion List - TechNet Articles - Home - TechNet Wiki
A list of microsoft exclusions
Hp | Router Freak
Front Page
Wiki whose focus is PeopleProjectsAndPatterns in SoftwareDevelopment.
tinyPM - Agile Collaboration Tool - Smart, Advanced and Lightweight Project Mana...
The Photographic Periodic Table of the Elements
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1: SnTT – Updated (V3) St...
How to transfer the logins and the passwords between instances of SQL Server 200...
Browse Interleave Files on SourceForge.net
Slashdot IT Story | Botnets Using Ubiquity For Security
Security through Ubiquity
Home — CMDBuild
iTop
SQL Server lifecycle and the compatibility level settings - Cindy Gross - Troubl...
Free Credit Score & Credit Report Card. No Credit Card Needed
Billing, CRM and trouble ticketing - Freeside
Welcome to RT Se7en Lite - Introduction
7Customizer a replacement for vlite for windows 7 - MSFN Forums
Coova :: Open Source Captive Portal Access Controller and RADIUS Software |
NoCatSplash - SeattleWireless
Best Free and Open Source CRM Software | TechSource
The Ultimate Bash Array Tutorial with 15 Examples
TechSoup - The Technology Place For Nonprofits  
100 Terrific Web Tools for Meeting Your Personal and Career Goals
The Regex Coach - interactive regular expressions
The resume is an introduction, not an interview - One Louder - Site Home - MSDN ...
FILESTREAM Storage in SQL Server 2008
Moving FileStream data to new location - Sriram"s 2 Cents - Site Home - MSDN Blo...
Vladi Belperchinov-Shabanksi "Cade"s home site away/dfeta
PBS Helpdesk Start
Can I listen to you Mr. MSDTC? - Microsoft SQL Server Tips & Tricks - Site Home ...
Understanding the Performance Characteristics of Your System: Part 3 - PTC Windc...
Understanding the Performance Characteristics of Your System: Part 3
Understanding the Performance Characteristics of Your System: Part 2 - Dassault ...
Understanding the Performance Characteristics of Your System: Part 2
Understanding the Performance Characteristics of Your System: Part 1 - Dassault ...
SQL Server Latest Updates – May 2010 - SQL Adventures in Africa - Site Home - MS...
How to shrink Transaction Log (TLOG) quickly to reclaim space - Sakthi"s SQL Ser...
win7utils - Windows 7 ISO Disc Image Utilities
VisualCV • Get a better resume, online.
Reprofiler - A tool for repairing broken userprofile-associations.
Live Hacking | The Ultimate Guide to Hacking Techniques & Countermeasures for Et...
Association of Support Professionals—Tech Support Benchmarks & Best Practices
American Scientist Online
FGA: SPF is harmful. Adopt it.
Tracking Inflation: Consumer Price Index Explained - Infographic » My Money Blog
The things that are better left unspoken : Transitioning your Active Directory t...
An Introduction to the Windows System State Analyzer - Ask the Performance Team ...
Windows System State Analyzer
Two-Minute Drill: Disabled performance counters and Exctrlst.exe - Ask the Perfo...
Windows Server 2003 Security Baseline
roomle.com - the online room planning platform - GET THE IDEA!
Sev17
SQL Server PowerShell Extensions
blog.scottlowe.org - The weblog of an IT pro specializing in virtualization, sto...
Juniper Networks - What is the recommended ScreenOS version? - Knowledge Base
www.juniper.net/customers/csc/software/netscreen_versions.jsp
Welcome to The Sietch - A community of friends changing the world for the better...
Energy Savers: Approved Energy Efficient Appliance Rebate Programs
IBM - Index of recommended Fix Packs and fixes for Lotus Notes, Domino and iNote...
ReThinkHR (ReThink Human Resources)
Tabnabbing: A New Type of Phishing Attack « Aza on Design
VMware Documentation Downloader v10.04.14 | Xtravirt
VMware Documentation Downloader
Xenophane"s Blog » Blog Archive » Output a sortable HTML table
Dividend Window
Find the best sunscreen for you | EWG"s 2010 Sunscreen Guide
SQL Server and Log File usage - Blog do Ezequiel - Site Home - MSDN Blogs
Copyc.at | Check your webpage copy for readability
Want to speed up the SQL Server Setup Installation Wizard - SQL Server Setup - S...
PolicyTool - Now Available Free Social Media Policy Generator
SD Formatter 3.0 (Beta) for SD/SDHC/SDXC - SD Association
Scan Websites for Viruses - URLVoid.com BETA
ediscoveryinfo
IIS7.x: A Common Mistake when reinstalling IIS 7.x - errors 0x80070490 and 0x800...
Precision Computing - More PowerShell Syntax Highlighting
Visual Studio 2010 Architecture Guidance – Why are we talking about two types of...
Starting/Stopping your SharePoint 2010 Dev environment with Powershell - MOSSy B...
Customize setup for Office 2010
Configure a silent installation of Office 2010 by using Config.xml
StartCom Free SSL Certification Authority
www.tspforum.com | Tips & Tricks for Nortel Meridian
TommyP"s HFSLIP
perl2exe unpacker by (GalaxyMaster)
OpenDocument Developers Corner
epubcheck - Project Hosting on Google Code
The New Domino Admin » Blog Archive » Lotus Domino: What’s Going to go Wrong whe...
The unclustering of Domino
AlFahes Configuration Auditor: Main/Home Page
vCheck (Daily Report) « Virtu-Al
deltasql, Database Evolution under Control
Upgrade Juniper SSG 5 from the command line CLI | Network Users Group
Credenza Software - Professional Practice Management Inside Outlook
Seth"s Blog: The modern business plan
Applicant Tracking & Online Recruiting Made Simple - The Resumator
Your PasswordCard
ClearBits™ - Hosting and Distribution of Open Licensed Media
LCD monitor test images
Wi-Fizzle.com | TCL"s Expect, Autoexpect
The One Ring
TruPax.com
Simulating a more interesting environment with Vyatta and VMware ESXi – pt 3 « C...
Simulating a more interesting environment with Vyatta and VMware ESXi – pt 2 « C...
Simulating a more interesting environment with Vyatta and VMware ESXi « Carlos" ...
Free Online Employee Scheduling Software - ShiftPlanning.com
Effective To Do Lists - StacksAndStacks.com
ToneTool | Portable tone & selcall generator
Terry Zink"s Anti-malware Blog : Conficker - The Enemy Within
Download details: Windows 7 Deployment Plan: IT Pro Work Template
DROID | Get DROID at SourceForge.net
Resolving stop (blue screen) errors in Windows 7
Dassault Systèmes ENOVIA V6 on SQL Server : Understanding the Performance Charac...
Understanding the Performance Characteristics of Your System: Part 2
Converting a virtual disk image: VDI or VMDK to an ISO you can distribute | Turn...
How Linux Saved A Fast Food Giant. | Holy Crap My Hair Is On Fire
A Piece of Internet History
The Evolution Of Usenet News: The Poor Man"s Arpanet
Wimba Pronto
10 Organic Garden Aids For Pest & Disease Control : TipNut.com
Siginet Software Forums - Powered by vBulletin
Random Musings of Jeremy Jameson : Use PowerShell to "Reset to Site Definition" ...
Free Resume Help | Blue Sky Resumes
SQL Server Setup : Want to speed up the SQL Server Setup Installation Wizard
Car Care Automotive Maintenance Software - Free Mycar-Monitor - Bug tracker - In...
Nagios Meta Check Part 3
ODESSA
HealthBlog : Wizards of Health Technology
Lorem Ipsum - All the facts - Lipsum generator
Lorem Ipsum
Mark Arend : SharePoint 2010 Content Database Size
Shalla Secure Services KG
wpkg-gp - Project Hosting on Google Code
Linux and 3G. Not as tough as you’d expect! « 0×0000
Desktop Google Reader
Nexus SC: The System Center Team Blog : Virtual Machine Servicing Tool 3.0 Beta ...
Koha Library Software Community
Mentioned in the Humanitarian FOSS.
In-Out Board, Staff Status and Availability - Tabzon
How to set required NTFS permissions and user rights for an IIS 5.0, IIS 5.1, or...
Default permissions and user rights for IIS 6.0
Description of default permissions and user rights for IIS 7.0 in Windows Server...
Gautam Goenka (MSFT) : How To: Test your application on slow network
MetLife | Brand Center
Giz Explains: Why Using Your Phone In Another Country Costs So Damn Much - Inter...
Arabind Coomaraswamy - Australian Visual Studio Product & Licensing Blog : Visua...
Arabind Coomaraswamy - Australian Visual Studio Product & Licensing Blog : Who n...
Blog do Ezequiel : SQL Server and Log File usage
shadowbox | 2010 wave for developers : Quickstart: Creating a Bootable USB Drive
Is Your Data Center Power and Cooling Truly Safe? « UNIX Administratosphere
Use "configure replace" Instead of "copy start run" - Packet Life
Dr. Z"s Blog : Moving Data from SQL Server 2000 to SQL Server 2008
Grant Holliday"s Blog : How to: Copy very large files across a slow or unreliabl...
My learnings : Generate GUID using guidgen.exe
Disney Vacation Tips and Lessons Learned
Computer Science Teacher - Thoughts and Information from Alfred Thompson : Progr...
Creating Passionate Users
PTC Windchill on SQL Server : Are You Making This Common RAM Mistake?
Siemens Teamcenter on SQL Server : The Plan Cache
Vasu Sankaran : TF50374 error when upgrading to TFS 2010
Random Musings of Jeremy Jameson : Upgrading TFS 2005/2008 Project Sites to TFS ...
PTC Windchill on SQL Server : SQL Server Maintenance Sequence
J.D. Meier"s Blog : The Secret of Results
The Secret of Results
Ladislau Szomoru : TFS Administration Tool 2.0 has been released
SQL Azure Team Blog : Vertical Partitioning in SQL Azure: Part 1
SQL Server Setup and Deployment Support and Information | TechNet
Young i Professionals
The Tax Foundation - "Hauser"s Law": Can Tax Revenues Exceed 19% of GDP?
HP bought Palm after a five-company bidding war -- Engadget
How to check if your email server looks like a spam source | Free Software tips ...
Andy"s House O" Blog: Multiple Notes/Domino address books on your BlackBerry
Terry Zink"s Anti-malware Blog : No cyberattack on Wall Street
Virtual PC Guy"s WebLog : General Floppy script [Hyper-V]
Don Jones on PowerShell
Microsoft SQL Server Tips & Tricks : INF: New SQL Server features in SQL Server ...
Microsoft SQL Server Tips & Tricks : INF: New SQL Server features in SQL Server ...
Help : Office 2010 technical support articles
Christophe Fiessinger"s Blog : Microsoft Project Server 2010 - A look at Demand ...
Microsoft Press : Automating Microsoft PowerPoint
PTC Windchill on SQL Server : Understanding the Performance Characteristics of Y...
The Geek Alphabet
Technology Cadre |
Semiconductor Reverse Engineering and Patent Infringement Analysis | Chipworks
Aaron Stebner"s WebLog : Silent install, repair and uninstall command lines for ...
Get a Job FAST using LinkedIn, Facebook or Twitter - Business Opportunities Webl...
Medzilla;Biotech jobs, Pharmaceutical jobs, Pharmaceutical sales jobs, Health Ca...
organic fertilizer: getting the powershell version
ASPj"s WiFi Page: mdk3, rt73, rt2570 and other aircrack-ng experiments
Wifi Analyzer for Android
This. . . is. . . Sparta! The Culture of Education 2.0 - O"Reilly Radar
KB03744 - How to silently install BlackBerry Desktop Software - Port3101.org : Y...
Juristech Associates Ltd Home
organic fertilizer: opalis: properly retrieving published data from powershell s...
Code Quarterly
Looking through the Windows : Installing Windows 7 on a MacBook via a USB
Microsoft SQL Server troubleshooting : SQLPORT – SQL Server Portuguese Community
Canadian Developer Connection : New Programming Jargon
Concur Travel & Expense | Business Travel Expense Report Management Software | T...
Microsoft SharePoint Social Computing Team Blog : How user profile synchronizati...
Running SAP Applications on SQL Server : Monitoring SQL Server I/O performance w...
Heath Stewart"s Blog : Detection keys for .NET Framework 4.0 and Visual Studio 2...
Pedro Silva"s Blog : Cool Extension: Power Commands for VS 2010
Lessons Learned : PowerShell for Non-N00bs: Creating Shortcuts
Lessons Learned : Powershell for non-N00bs: Creating XML the .NET Way
Windows PowerShell Blog : Configuring WSMAN Limits
Lessons Learned : PowerShell for Non-N00bs: LiveMeeting XML API and You
Beside the Point : Double-hop authentication: Why NTLM fails and Kerberos works
Sandeep Joshi"s Den : Office 2010 64 bit and SharePoint Datasheet/Export to Acce...
Siemens Teamcenter on SQL Server : Updating a SQL Server Failover Cluster
Support Details | Tech Support Management
Get things done. Simple todo list - without the list.
gmapcatcher - Project Hosting on Google Code
SQL*Net compression « Oracle Scratchpad
WWoIT - Wayne"s World of IT: Keeping Citrix sessions alive with sendkeys
PTC Windchill on SQL Server : Managing a SQL Server Failover Cluster
StyleCop
Active Setup Explained « Helge Klein
50 Body Language Secrets You Need to Succeed in Life
Who Owns All the Data in the Workplace?
public sector employees" rights to workplace privacy in the digital age.
Oil spill approaches Louisiana coast - The Big Picture - Boston.com
How to make an ‘Obama’ HOPE Poster in GIMP | Scott Photographics | Photography &...
Ad Bard Network | Ad Bard Network
How to Delete a Failed Domain Controller from Active Directory « Useful Glyphs
Submin - Subversion Web Administration
The Absolute Minimum Every Software Developer Absolutely, Positively Must Know A...
The Floating-Point Guide - What Every Programmer Should Know About Floating-Poin...
Principles of Robust Timing over the Internet - ACM Queue
Upgrading to SharePoint Server 2010
Windows PowerShell Blog : A PowerShell Wander: ToolBox Mindset, –ExpandProperty,...
Beside the Point : Calculate Time-to-First-Byte with PowerShell script (Ping-Url...
Phishing and Spam IQ Quiz by SonicWALL
Digital Forensic SIFTing: SUPER Timeline Analysis and Creation
Super-Timeline Analysis
Microsoft SQL Server Tips & Tricks : SQL Server 2008 & SQL Server 2008 R2 cluste...
Temenos T24 on SQL Server : Performance Analysis of Logs (PAL) Tool: Part 1
Siemens Teamcenter on SQL Server : Reading the SQL Server Error Logs: Part 5
DNS-OARC | The DNS Operations, Analysis, and Research Center
Resequencing ACL Entries - Packet Life
Checksuite System Administration Tools
1-800-Recycling | Search for Recycling Centers, Green News and Tips
hoopajoo.net | IPDF
» BVC #17: The Luhn Algorithm
Luhn Algorithm
Setting Up Subversion for One or Multiple Projects | Linux Journal
mireka - Project Hosting on Google Code
The Many Faces of Mike McBride » Blog Archive » Fourth Rule of Knowledge Workers...
The Many Faces of Mike McBride » Blog Archive » Third Rule of Knowledge Workers:...
The Many Faces of Mike McBride » Blog Archive » Second Rule of Knowledge Workers...
The Many Faces of Mike McBride » Blog Archive » First Rule of Knowledge Workers:...
The Many Faces of Mike McBride » Blog Archive » Rules of Knowledge Workers -Intr...
Carpe Datum : SQL Server for the Oracle DBA Links
10 cool things you can do with Windows PowerShell | 10 Things | TechRepublic.com
#drupalcon Florida Hospital Takes Charge of Their Destiny with Drupal
IIS Aid | Microsoft Internet Information Services Support
Decrypt my World
Carpe Datum : Data Movement and the Decision Matrix
Pradipta"s Sql Server Blog : Deadlock Identification and Resolution - SQL 2000 a...
Pradipta"s Sql Server Blog : Sql Server General performance
Pradipta"s Sql Server Blog : Database Mirroring in Sql Server
Pradipta"s Sql Server Blog : SQL Server Corruption
Pradipta"s Sql Server Blog : All Sql Server Resources
Pradipta"s Sql Server Blog : Uninstalling SQL Server 2000, 2005 & 2008 on a Clus...
Pradipta"s Sql Server Blog : Uninstalling SQL Server 2000, 2005 & 2008 on a stan...
Pradipta"s Sql Server Blog : Sql Server Setup and Upgrade on a standalone box
Pradipta"s Sql Server Blog : Sql Server Setup and Upgrade on a Cluster
Diary Of An x264 Developer » Announcing the first free software Blu-ray encoder
How to colour gradient match photos in GIMP | Scott Photographics | Photography ...
The Structure of Authority: Why security is not a separable concern
Aircrack-ng
Procurement and Open Source Software Guideline —
Troubleshooting BlackBerry Enterprise Server Integration : Brian Desmond"s Blog
Siemens Teamcenter on SQL Server : Monitoring SQL Server"s Disk Subsystem
PTC Windchill on SQL Server : Reading the SQL Server Error Logs: Part 2
cmdln.org (a sysadmin blog) » Blog Archive » Analyzing I/O performance in Linux
FE blog : What’s new in the Office 2010 applications
Microsoft SQL Server troubleshooting : TechDays 2010 – SQL Server Engine Interna...
Microsoft SQL Server troubleshooting : TechDays 2010 – SQL Server High Availabil...
Dassault Systèmes ENOVIA V6 on SQL Server : Reading the SQL Server Error Logs: P...
Dolibarr Home
Monitoring OpenSolaris from an iTouch : Karim Berrah"s Weblog
The New Domino Admin » Blog Archive » Lotus Domino: The Simple Joy of Making a S...
The Mathematics Genealogy Project - Welcome!
The Secure Shell (ssh)
Motivation and Open Source - Linux Magazine Online
McAfee KnowledgeBase - False positive detection of w32/wecorl.a in 5958 DAT (for...
Social media demographics
Guest Post: Advanced GTD with Remember The Milk - Remember The Milk Blog
Sanjay Narang"s thoughts on SharePoint : SharePoint 2010 Performance (Stress, Lo...
Imagine Think Create Share : SharePoint Server 2010 Performance and Capacity Man...
SharePoint Technologies...from the field : SharePoint 2010 – Just published whit...
Siemens Teamcenter on SQL Server : Reading the SQL Server Error Logs: Part 1
Microsoft Fix it Center Online
Domiclipse :: RPC Monitor plug-in for Notes 8
Kexi Project - "Microsoft Access for Linux" - Home
MindTouch - Open Source Collaborative Networking for Intranets and Extranets
QuteCom - Home
Karsten SlideShow Project
openSIS | Open Source Student Information System
Archimedes - we"re back — Archimedes - The Open CAD
Areca Backup - Official Website
Linux Lock down - Security Blanket® Technical Blog
SpaceSniffer, find lost disk space the easy way.
Windows Freeware by Steffen Gerlach
How To Set Up Call Forwarding With Google Voice
Oleksiy Gayda"s Tech Blog: How-to: Juniper SSG - Reset to Default Settings
HWiNFO & HWiNFO32 - Hardware Information and Analysis Tools
Microsoft Fix it Center Online
Cisco Debug Enabled? - Terry"s Blog
TechnoLawyer Blog: Workshare Protect Server: Read Our Exclusive Report
The Invisible Catalyst Switch - Packet Life
Main Page - Openscap
infoScoop OpenSource Site - News
gsm_phone-anatomy-latest.pdf (application/pdf Object)
Ext2Fsd Project
Ext2 IFS For Windows: Screenshots
NagiosGrapher: HTTP Response Time
PROUHD: RAID for the end-user.
Prescription Assistance Program |
ostinato - Project Hosting on Google Code
Home (bonkey, the backup monkey)
The pmacct project: libpcap, NetFlow, sFlow, memory tables, SQL, RRD, BGP, probe...
check_rbl – nagios_plugins
Getting Started with Inkscape – Make Tech Easier
Resource Manager
Leave the CDs in the Office | Linux Journal
Business Has Killed IT With Overspecialization - www.enterprisenetworkingplanet....
Sage North America - Business Software Solutions for Accounting, CRM, ERP, FAS, ...
ERP Software, MASS Group - Manufacturing Automation Software & Systems Group, En...
gelogic homepage
Cisco Template Manager
Hard Drives Can Pose Risks to Sustainability - O"Reilly Broadcast
Plan Cruncher
fewt@blog:~$ _: System security? What about your DATA!
Nokia N900 overclocked to 1GHz in bid to outrun obsolescence (video) -- Engadget
USB/IP Project
NTA Monitor - ike-scan
United States - Cisco Systems
Comt
VirtualBox Virtual Appliances | VirtualBoxImages.com
You may want to avoid hacking your open-source CMS - FierceContentManagement
Selenium web application testing system
Philosophical Games: Hudsuckr: Advanced Windows proxy configuration from the com...
unimpressed.org
NexentaStor Project - CommunityEdition - NexentaStor Project
Membrane SOAP/HTTP Monitor and Proxy
Buck Security - Security Checks for Debian Linux
memonaut - Project Hosting on Google Code
NPAD Diagnostics at Three Rivers Optical Exchange (3ROX) (Pittsburgh, PA)
Storage OEM - Fibre Channel, iSCSI, and SAS Storage Arrays – Dot Hill
Windows PowerShell Blog : Testing cmdlets with FxCop
killerbee - Project Hosting on Google Code
friends « HR Geeks
JXplorer - an open source ldap browser
Gabriel Morgan : Positive and Negative behaviors to look out for in Enterprise A...
Using a Garmin GPS 18 LVC as NTP stratum-0 on Linux 2.6
Twitter FAQ: RT, HT, OH Explained. | Brent Ozar - Too Much Information
Escape From PDF « Didier Stevens
PS3Cluster Guide: By The Cluster Workshop
How To Read Your Camera’s Histogram And Take Perfectly Balanced Images
What Is A CPU and What Does It Do? [Technology Explained]
SharePoint 2010 Licensing Explained « Murray Gordon
Siemens Teamcenter on SQL Server : Creating a Performance Baseline - Part 1
Keyboard shortcuts - Google Reader Help
URL Encoding
Microsoft Mouse Mischief
Microsoft SMB Community Blog - By Eric Ligman : Be sure the customer’s name is o...
Change This - The Myth of Overnight Success
GMapCatcher Browses Online Maps and Saves Them for Offline Use - Maps - Lifehack...
Etacts - Gmail Browser Extensions
Decrypt my World : How to change drive letters (VBScript)
wissel.net :: Understanding the Notes directory structure
wissel.net :: Comparing Microsoft and IBM deployment diagrams - Part 1
Prevent inbound spam in Lotus Domino Mail Server part1 | Lotus Notes Tutorial Si...
System Garden - Habitat
WWoIT - Wayne"s World of IT: More useful command-lines
Linux Software - Mini SNMP Daemon
iTuner - The iTunes Companion
SamyGO, Samsung Firmware on the GO
The Tax Foundation - States Extending Income Tax to Travellers
The Tax Foundation - High Sales Taxes
Lotus Notes Ninjas: Prevent Lotus Notes mail server being used as an open relay ...
Linux Kernel Driver for Garmin GPS/USB | Get Linux Kernel Driver for Garmin GPS/...
GpsDrive - a free car (bike, ship, plane) navigation system
LinuxPlanet - Tutorials - Stumbling and Sniffing Wireless Networks in Linux, Par...
OpenAPC - Open Source Advanced Process Control - Open APC
Hack From A Cave
Wiki Web Help
Use ssh_config To Simplify Your Life | Linux Journal
Opendedup
Zim - a desktop wiki
One Mile at a Time - Tips, Tricks, and Travel with Lucky
USAir offering fastest way to Preferred status - Triangle Trip
MobaXterm - The free multitab Unix browser for Windows
Making Sense of DNS
The Apache Cassandra Project
Remmina - The GTK+ Remote Desktop Client
drizzle.org
TaskForest - A simple, expressive, open-source, text-file-based Job Scheduler wi...
Understanding the IBM Lotus Notes 8.5.x client directory structure
resetting client info is in here.
BIND zone file creator
.LRN Home
Deploy Trusted Root CA Certificate (command line) | Victor Tong"s Blog
Backupify :: Secure Online Backup and Archiving for Gmail, Facebook, Twitter, an...
"Making Sense of Privacy and Publicity"
Freedom In the Cloud
Download the Microsoft Web Platform
AlexSemi"s Blog : ZTIWindowsUpdate.WSF does not install all patches
Lessons Learned : PowerShell Gotchas: Looping with $null
PTC Windchill on SQL Server : Defragging Your Indexes
Microsoft SMB Community Blog - By Eric Ligman : Microsoft Open License Basics - ...
Terry Zink"s Anti-malware Blog : What we know (and learned) from the Waledac tak...
The figure description language: Box | Get The figure description language: Box ...
Inside Microsoft Dynamics GP : Feature of the Day: Rapid Migration Tool - Peacht...
WebTopics : IIS 7.5 – How to enable IIS Configuration Auditing?
untitled
Electronic Discovery Software, Discovery Assistant for eDiscovery
BackUp Tapes: Friend or Foe? « docNative Paradigm Blog
Legal Transformation: The Changing Legal Profession: Resource Management within ...
unexpected-incident-response.pdf (application/pdf Object)
Slashdot Hardware Story | Server Room Smells Can Be an Early Warning
True, True
Mercurial SCM
home/host/glitch.tl/repos/wifi-scanner: Summary
Athena FirePAC - Firewall Security Software
LedgerSMB.Org | Community developed Open Source accounting software
Grisbi - Personal Finance Manager for all
http://www.overstock.com/ringsize.html
Windows 7 RC | Support, Deployment, Resources
OpenMainframe.org - Home Page
The National Broadband Plan: Connecting America
How To Install Windows 7 On Your Netbook From A USB Flash Drive
MBRWizard! - The MBR Management Utility
MX Lookup Tool - Check your DNS MX Records online - MxToolbox
ForgeRock
Not 403: An example of the awesomeness of the open source community
Regional Nagios Server Setup | Linux Server Training
Rick Mitchell Solutions - RMSBlog: Configure port forwarding on Juniper routers ...
McAfee KnowledgeBase - Webwasher: How to Enable SSH Access for Appliances
Solution There are a couple of ways to enable SSH access to the appliance. Afterwards, you can log into the Webwasher using an SSH client like PuTTy.
http://www.antapex.org/unix.txt
TrustedSource - Check Single URL
Nasuni - The gateway to cloud storage
http://serverprotect-p.activeupdate.trendmicro.com/activeupdate/server.ini
What pattern version is trendmicro currently at?
SharePoint Escalation Team : SharePoint 2010 Logging Improvements – Part 1
SharePoint Escalation Team : SharePoint 2010 Logging Improvements – Part 2 (Intr...
The Science of Network Troubleshooting - Packet Life
ViewVC: Repository Browsing
Security Compliance Management Toolkit Series
Best Practices for Optimizing Group Policy Performance
Download details: Group Policy Inventory (GPInventory.exe)
SourceForge.net: phpivr - Project Web Hosting - Open Source Software
GenSnortDNS - Generate Snort DNS signatures
pdnsd maintenance page by Paul Rombouts
Top 20 Nginx WebServer Best Security Practices
UNIX History
wattOS :: Light - Fast - Now
The Raven Report | Cleaning up the Altiris Helpdesk Database
The Systems Engineer
AKB 20356: Unable to modify incident: This incident is being modified by another...
Wriju"s BLOG : Free Guide Books from Microsoft
Jotti"s malware scan
Why is my screen black when I start Windows 7?
Shavlik - Simply Secure
Samurai | Get Samurai at SourceForge.net
County Health Rankings
Please Rob Me
Photo Friday: Monitor Calibration Tool
Staying safe: protect yourself when selling a game console
How to build and maintain a tiered WSUS infrastructure
Search the PopSci Archives | Popular Science
Data in, Brilliance Out | Tableau Public
EssayRater - Home
Ride The Lightning: The Rebellious Millennial Employees: We Love the Evidence Th...
global_millennial_generation_research.pdf (application/pdf Object)
5 Tips to Acing An Interview | Wise Bread
Fixing a Problem with Nmap
FusionInventory » Time to unify them all! ;)
android-forensics - Project Hosting on Google Code
Nerd Merit Badges - Welcome
SAP and IBS-STL UK: A Timeline and Some Reflections « UKCBD: The Christian Books...
Inside Architecture : Should IT run “like a business” or “like a non-profit?”
dnsmap - Project Hosting on Google Code
dvdtube - Project Hosting on Google Code
Home - exscript - GitHub
STARDEV: Cluster - Welcome to StarCluster!
That Mysterious # sign in Twitter…What Does it Mean? | KristineWirth.com
NOX | An OpenFlow Controller
Home | vyatta vs cisco
Open vSwitch
how not to be a leader leadership | Ian"s Messy Desk
Coadunation OS: | Making the web your Desktop
RedKrieg’s Blog » Ghost 4 Linux complete guide to imaging
FOG :: A Computer Cloning Solution - Home
PXE Knife
AppDelivery » Migrating files and folders with Robocopy
Jiange Sun"s WebLog : A win2k8 server is running out of disk space but I cannot ...
Windows - When in doubt reboot:
» What Do Credit Card Numbers Mean? Making Sense of Your Credit Card Number
Steganography: The art of hiding stuff in stuff so others don"t find your stuff ...
Powershell for Batch Operations « Home of the Scary DBA
Mail::Postini - search.cpan.org
NetResView - View computers/network shares
BluetoothView - Monitor the Bluetooth activity around you
Oolite
Mail Relay Testing Tool
Excel Writer
Interesting Letterhead Designs | Letterheady
Tips, Tricks, and Advice from the SQL Server Query Processing Team : Understandi...
Microsoft Business Connectivity Services Team Blog : BCS PowerShell: Introductio...
Microsoft Assessment and Planning Toolkit Extender (aka "DBSpider")
Carpe Datum : Restarting the SQL Server Service Account – Why?
Jay"s notes on SQL : Creating a custom performance monitor counter for SQL Serve...
Linda Chong"s Blog : Making the Case: Discovering the Business Value in a Potent...
andLinux.org -- Run Linux natively inside Windows
Script to add the current user to the SQL Server "sysadmin" role - Home
howard rheingold"s | tools for thought
The WELL - the birthplace of the online community movement.
InternetSafety101.org: Internet Safety 101
Nick MacKechnie : Exchange Pre-Deployment Analyzer
granth"s blog : TFS2010: Create a new Team Project Collection from Powershell
NCDevGuys" ramblings on connected bits.... : Creating a bootable VHD image
Team Foundation Server Team Blog : Reporting in Team Foundation Server 2010 – Pa...
Team Foundation Server Team Blog : Reporting in Team Foundation Server 2010 - Pa...
Team Foundation Server Team Blog : Reporting in Team Foundation Server 2010 – Pa...
All topics fundamental : Windows Server 2008 R2 Virtual Hard Disk (VHD) Performa...
while (alive) { writeCode(); } : SharePoint 2010 & Service Provisioning
net stop SPAdminV4 && stsadm -o execadmsvcjobs
PuTTY Connection Manager
Microsoft SharePoint Team Blog : SharePoint Dialog Auto-Sizing and Master Page C...
Visual Studio SharePoint Development Blog : How to deploy a SharePoint Site Defi...
Reprofiler – Repair Tool of the Week | Technibble
Want More Photography Knowledge? Try These Free MIT Courses | Your Photo Tips
ADRestore.NET rewrite - Windowmaker"s blog
Carpe Datum
Experimenting with VLAN hopping - Packet Life
Document drafting | Document assembly | Document automation
Understanding MSTP - CCIE Blog
The Skill of Interviewing Part 3 - InsideRIA
Startup Manager
Research-IO
Auctions for Free Stuff - Listia.com
A Big Case of ...OOPS... - Following the White Rabbit Blog -
Ignite | Ignite Show Video
www.culturalcognition.net - home
On MicroSD Problems « bunnie"s blog
Netdisco Installation and Configuration
Simple PM - What Everyone Needs to Know About Project Management
Contract Analyst - Contracts Management System - Home Page
Introduction to DNSCurve
Panopticlick
IAN Symbol Libraries (Free Vector Symbols for Illustrator) - Integration and App...
Open Security Architecture
Admin script mistaken for self replicating virus! WTF! | Ask The Admin
Project management, requirements, collaboration, and task software: Endeavour
AlienVault - Creators of OSSIM - The OSS Correlation and Security Suite - Commun...
FXS, FXO explained
‘Time Bomb’ May Have Destroyed 800 Norfolk City PCs — Krebs on Security
Virus brings Norfolk"s computers to a screeching halt | HamptonRoads.com | Pilot...
nagaconda - Project Hosting on Google Code
Weird Usage Of “select” in perl | Safer Code - Secure Coding In C C++ And More..
Using Linux to back out a Windows XP patch - Computerworld Blogs
cdpr | Get cdpr at SourceForge.net
Spacewalk: Free & Open Source Linux Systems Management
Network Tracker
Securing the Debian zones
BarMax CA for iPhone, iPod touch, and iPad on the iTunes App Store
Network Address translation (NAT) cheat sheet - Packet Life
OneNote Testing : Optimizing a test virtual disk for distribution over our inter...
Microsoft Enterprise Content Management (ECM) Team Blog : Introducing Document M...
Active Directory Rights Management Services - AD RMS : Decommissioning AD RMS
Eric Kraus" SharePoint/.NET Blog : Backup Documents in SharePoint Using PowerShe...
SAP Global Alliance Technology Team Blog : System Center Virtual Machine Manager...
Microsoft Perspectives on Payments and Core Banking in Financial Services : Brid...
Access Road | Get Access Road at SourceForge.net
Splice Label Maker : Overview
Browse TeleKast Files on SourceForge.net
UNetbootin, Universal Netboot Installer | Get UNetbootin, Universal Netboot Inst...
Wiring the Vancouver Olympics | Beyond Binary - CNET News
Webbasierte Projektzeiterfassung für Dienstleister - openTimetool: Home
SendmailAnalyzer
Snoopy Logger | Get Snoopy Logger at SourceForge.net
Moodle reporting « Matteo Redaelli
NTFS Disk Recovery | HowtoForge - Linux Howtos and Tutorials
PHP-Calendar
Gosmore - OpenStreetMap
How do I enable ClearType in Windows XP?
Cleartype Registry
New to Japan - Language - Useful Japanese Expressions
Japanese Grammar Guide | Tae Kim"s Guide to Learning Japanese
Stolen Computer Registry - Homepage - Report and Search
How To Network Like A Rockstar « The Adventures of Reddsmitty
The Ten eDiscovery Commandments Revealed | Electronic Discovery Blog
Fuji-sama › Japan Today: Japan News and Discussion
Tellu Inventory Management
SecurityFriday [NBTdeputy]
ProxInbox : ProxInbox - Get proxies in your inbox
Email Updates | Anonymode Proxy Network
everydayproxy.com
Weird Kindle tricks: screensavers, screenshots, and games
Cheat Sheet and Quick Reference Card Directory | devcheatsheet.com - Cheat Sheet...
Project Server 2007 : Microsoft Project 2010 Ignite
A consultant"s perspective on FAST ESP and SharePoint Technologies. : Installing...
Tips and Tricks : Quick adapter speed settings? Use PowerShell
Joaquin Torres - BIG BLOGGIN : Ping a Subnet
msdev: SQL Server 2008 Express How-To-Guide Series
System Center Cross Platform and Interop : A PowerShell script for removing all ...
Canadian Developer Connection : CUSEC 2010 Keynote: Douglas Crockford – The Soft...
Maberry Centre Bat Homes :: Welcome to the world of bats!
The UK Higher Education Blog : Ready-made IT user documentation
Ready-made IT user documentation
The SF Site: The Best in Science Fiction and Fantasy
Hour 25 Home Page
Strategic Legal Technology :: Considerations for In-Sourcing and Outsourcing E-d...
Managing eDiscovery « eDiscovery Assistant
Command Line Kung Fu
Your Name In Japanese
Build An Impressive Free Resume Online In 15 Minutes With JobSpice
Free image vectorizer
Software for print quota and print control management. Your print accounting and...
PaperCut Print Logger - free logger and auditing program
Xerox are ripping me off « The Angry Technician
Main Page - Eth0Wiki
Linux Experiences: Linux Newbie : Why grep almost never yields something product...
rtspdump: Solution to playing MS-RTSP (WMS / WMV / X-ASF-PF) on Linux
Cisco Routers Help, CCIE lab - CCIE training - CCNP, CCNA Cisco Router Forum, Ce...
Im still trying to see the humor behind the site - not work friendly
Home | Email Standards Project
Personal Message Store Export Utility
Website Security Check - Unmask Parasites
The Hidden Dangers of PST Files
Download details: Microsoft IT Environment Health Scanner
ionipti: libpst and readpst... the hacked way on vista
TidBITS iPod & iPhone: Prepare Your Enterprise for the iPad
Lotusphere 2010: An Oral History Of Ibm Lotus Notes First 20 Years
SQL Power - SQL Power DQguru Data Cleansing & MDM Tool
OfficePOD®. Changing the way people work. Welcome to the next generation of work...
» How to Build a Zero-based Budget
Strong Authentication - e-Identity - PKI Solutions
Choose the optimal VPN service - Internetworking Expert Hints
Ra Testing Manager
terrastore - Project Hosting on Google Code
Gregor"s Tools and programs
IPv4/IPv6 DNS and DHCP config generator
Data Recovery in the event of your Death
Amateur Radio/Ham | Linux Journal
Legit Torrents - Legal Torrents, Free Media
Public Domain Movie Torrents with PDA iPod Divx PSP versions
LegalTorrents™ - Film, Music and Digital Media
OpenOffice.org Extensions for Business Users | Worldlabel Blog
Rachota Timetracker
Not enough server storage | Windows Problem Solver
Arch Reactor - News
NES stuff
SocNetV - Social Networks Visualization and Analysis Software
Topsy - A search engine powered by tweets
Main Page - OneCMDB
MonitoringForge: Network Management Software
eventh - Project Hosting on Google Code
Lucidor - E-book Reader
Timeclock Software | Employee Timeclock Software
National Software Reference Library
To DeNIST or Not to DeNIST, that is the question! « Bow Tie Law’s Blog
DeNIST
SiT! Support Incident Tracker
Torrus Project
Computer Science Teacher - Thoughts and Information from Alfred Thompson : So ar...
Microsoft UK Schools News Blog : Top 10 ICT Money Saving Tips – 6 – Stop buying ...
Academic Earth | Online Courses | Academic Video Lectures
Ten essential Python tips for beginners | Linux User
organic fertilizer: list domain controller site information with powershell
Project SIKULI
PowerShell Script for Creating Indexes « Home of the Scary DBA
How to Protect Your Privacy with Facebook’s New Privacy Settings in 17 Easy Step...
Active Directory Powershell Blog : Adding/removing members from another forest o...
Null Reference Exception : Learning PowerShell: Random Album
Powershell4SQL
The Gates Notes
odmon.com - Online Device Monitoring
Microsoft Project Team Blog : Project 2010: Introducing the Backstage view
SharePoint Brew : SharePoint 2010 Shared Service Architecture Part 1
Windows Update Error Code 8024A000
Make IT Right : More than trends
Information Security : Reducing Operational Risk through Business Continuity Man...
organic fertilizer: using psexec to launch processes that survive logoff/logon …
organic fertilizer: enabling ntlm authentication with firefox
20 (More) Awesome GIMP Brush Sets | TECH SOURCE FROM BOHOL
Steve Friedl"s Home Page
Legion: A Worldwide Virtual Computer
Scannedonly Scalable Samba Anti-virus module
./: The Tower of Babel
VirtualBox’s Little Secret: The Command Line | Linux Magazine
AdFreak: Apple Get a Mac: The Complete Campaign
EvilPacket MiFi GeoPwn
SECURE WORLD-Know your threats : Password policy settings, Vulnerability,counter...
webERP: What Is webERP?
lnav -- The Logfile Navigator
Programming with proportional fonts is great - m-mz"s posterous
PowerShell Notes : Getting Uptime of Multiple Servers
Decrypt my World : How to get all DCs in a Forest (VBScript)
Microsoft SMB Community Blog : How to add a license agreement to your view on Mi...
Microsoft Volume Licensing Service Center
Ask the Performance Team : An Introduction to the Windows System State Analyzer
Windows System State Analyzer
Windows Server : Windows Server 2008 R2 – Feature Components Poster
Windows 2003 Server falls off network | Michael McNamara
Click Start, click Run, type regsvr32 polstore.dll, and then click OK.
Root Wireless
» The S&P500 Dividend Aristocrats
Mac Specs, Prices, Answers, & Comparison @ EveryMac.com - Est. 1996
DIY solar Hot Water System build your own
Internetworking Technology Handbook - DocWiki
Unreasonable Security Practices That Will Soon Be Even More Irrelevant - www.ent...
queXS | An Open Source, web based CATI system
wissel.net :: Domino and Disk Fragmentation
Photo Calendar Homepage
Manage your business documents with Kraft
Text Stream Filters LPI Course Tutorial | Linux Server Training
The Official, Unofficial, Federal Desktop Core Configuration [FDCC] Blog
Federal Desktop Core Configuration
Federal Desktop Core Configuration - Wikipedia, the free encyclopedia
Federal Desktop Core Configuration (FDCC) deployment resources
Complying with the FDCC Mandate
Project for Excellence in Journalism (PEJ) | Understanding News in the Informati...
A Journalist"s Guide to the Internet
vdbench | Get vdbench at SourceForge.net
Pitfalls of Benchmarking Flash with dd(1M) : Lisa Noordergraaf
UK SharePoint Team : SharePoint Server 2007 and Records Management: Part 4 of 4
On Ensemble : Masato Baba, Kristofer Bergstrom, Shoji Kameda and Kelvin Underwoo...
How You Can Tell Whether a Website is Safe
How to Read the Results of SELECT @@VERSION in SQL Server - Windows Live
Network Diagram v0.7beta
Planet M.U.L.E.
Programmers Need To Learn Statistics Or I Will Kill Them All
The PowerPoint Team Blog : 5 Tips on Getting PowerPoint to Sing!
SharePoint 2010 End-User Training
Notes from SQL Server Premier Field Engineer : SQL Server 2005/2008 database tun...
SQL Server 2005/2008 database tuning - picking low hanging fruits - part I
Notes from SQL Server Premier Field Engineer : SQL Server 2005/2008 database tun...
Sql Tools I use in the UK ADC Scalability Lab - Windows Live
Business Continuity Lifecycle
Add MIB files to Wireshark SNMP decoder - CT3
HWiNFO32 Download
MobileRead
Reversing Everything
Feedbooks | Food for the mind
Network Connection Chart | Get Network Connection Chart at SourceForge.net
Petit - Open Source
NetMap
What is UPR?
SourceForge.net: SerLooK - Project Web Hosting - Open Source Software
The Fast-Track Homepage
Jolicloud
Create Public Share on Samba | Linux Server Training
Cisco, Symantec, Apache Tackle Y2K10 Glitches — Datamation.com
Windows 7 has lots of "GodModes" (exclusive) | Beyond Binary - CNET News
{00C6D95F-329C-409a-81D7-C46C66EA7F33} {0142e4d0-fb7a-11dc-ba4a-000ffe7ab428} {025A5937-A6BE-4686-A844-36FE4BEC8B6D} {05d7b0f4-2121-4eff-bf6b-ed3f69b894d9} {1206F5F1-0569-412C-8FEC-3204630DFB70} {15eae92e-f17a-4431-9f28-805e482dafd4} {17cd9488-1228-4b2f-88ce-4298e93e0966} {1D2680C9-0E2A-469d-B787-065558BC7D43} {1FA9085F-25A2-489B-85D4-86326EEDCD87} {208D2C60-3AEA-1069-A2D7-08002B30309D} {20D04FE0-3AEA-1069-A2D8-08002B30309D} {2227A280-3AEA-1069-A2DE-08002B30309D} {241D7C96-F8BF-4F85-B01F-E2B043341A4B} {4026492F-2F69-46B8-B9BF-5654FC07E423} {62D8ED13-C9D0-4CE8-A914-47DD628FB1B0} {78F3955E-3B90-4184-BD14-5397C15F1EFC}
Surveys: IT job satisfaction plummets to all-time low
2010 bug hits millions of Germans | World news | The Guardian
Slashdot Technology Story | Hotmailers Hawking Hoax Hunan Half-Offs
epub2pdf : book pages your way : quick and easy conversion of EPUB to PDF
The so-called “God Mode” | BrandonLive
SourceForge.net: Lemon Pos - Project Web Hosting - Open Source Software
Kodak Easyshare Wireless Picture Frame - How to show everyone whats on your fram...
Ben Parker"s Blog : The security Permissions aren’t the same when I use Robocopy...
Microsoft SMB Community Blog : The end of my 10 years at Microsoft
Mobile Express Driver Drivers and Downloads
Global Print Driver Drivers and Downloads
Shoka
Enterprise Hosting for Notes, Domino, Exchange, Sharepoint, Java, Tomcat, JBOSS,...
How the internet works: Domains - Blog - Bill"s Blog
The Art of Estimation Part 2 - InsideRIA
The Art of Estimation Part 1 - InsideRIA
Public Domain Day
Crypto Law Survey
Rapid Analysis Program for Investment Decisions
Less Than Dot - Blog - Beginning stages of a DR plan for SQL Server
Real World Computing & Collaboration: Our Infrastructure Upgrades - Domino (Part...
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 5)
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 4)
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 3)
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 2)
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 1)
How To Enable Windows 7 Secret God Mode
Use any version of Windows 7 free for 120 days
Best Way - Can I Insulate the Floor of a Crawlspace With Rigid Foam Insulation? ...
Foam board installation in crawlspace
The Open Information Security Foundation - Suricata Downloads
Suricata
sshbl.org - (the SSH blacklist)
Serbert homepage
Malheur - Automatic Analysis of Malware Behavior
Egypt Tech Talk : Secrets of IE8
Free Cisco Tools - BradReese.Com
Whyteboard: Simple whiteboard and PDF annotator in Launchpad
GRC"s | DNS Nameserver Performance Benchmark  
"You can"t optimize it until you can measure it: "
Flash Player Version
DNSCog - DNS reporting and diagnostic tools
Network Tools: DNS,IP,Email
Ten years of BlackBerry -- Engadget
Bazaar
Traveling Couples: Chris Dunphy & Cherie Ve Ard | Travels With Two
Self-Annihilating Sentences --- S. Gorn
Scripting with Windows PowerShell
22 stories underground: Iron Mountain"s experimental Room 48
OnStar GPS Hacking (radioetcetera)
SourceForge.net: Virtual Cache - Project Web Hosting - Open Source Software
SourceForge.net: Proxy Tester and WPAD Generator - Project Web Hosting - Open So...
AutoCAD Free Download and ACAD upgrade
JLinBar - Barcode Scanning with a Webcam
HOME PAGE OF MISHA CHERKES
Repair Tool of the Week: Universal Silent Switch Finder | Technibble
The Official Site of Game Key Revealer and SoftKey Revealer - Mustafa Bugra AKTA...
VirusTotal - Free Online Virus and Malware Scan - Email/Uploader
http://www.theforcefield.net/wordpress/
Your Friendly Neighborhood Computer Guy
Tech Vets
Copy your files faster with TeraCopy
HOME PAGE OF MISHA CHERKES
Expert Online Tech Support, Computer Support by Phone and Remote PC Support | Pa...
BlueScreenView - blue screen of death (STOP error) information.
Uninstall & Remove McAfee Norton & More Antivirus Applications — AppRemover Site
Repair Internet Explorer with Fix IE Utility | The Windows Club
Fix WU Utility – Repair Tool of the Week | Technibble
Free Driver Update Software - Device Doctor
Christophe Fiessinger"s Blog : Microsoft Project Server 2010 and PowerShell
Microsoft Visual Studio/.Net Framework Setup & Deployment Tips & Tricks : How to...
Creating a self signed wildcard certificate for IIS7
SourceForge.net: travelingsales
A Kindle World blog
Imagine Think Create Share : Security SharePoint boundaries - Securable objects ...
Home Office Design Ideas and Tips That Every Web Worker Needs To Know
Manpreet"s SharePoint Developer Blog : How to get audit logs for various admin a...
Backupify :: Secure Online Backup and Archiving for Gmail, Facebook, Twitter, an...
The Geek’s Night Before Christmas
The Dividend Guy
#753699 - Pastie
Dividend Growth Investor
Massively Parallel Procrastination: Savory
Ian"s Thoughts: dxTop - Android home alternative
LinuxPlanet - Tutorials - Fixing Your Holiday Photos With GIMP - Redeye, Low Lig...
Open Source Job Scheduler Overview
Inside Architecture : Does IEEE-1471 Define Enterprise Architecture?
Space Stage Tips
Civilization Stage Tips
Tribal Stage Tips
Creature Stage Tips
Cell Stage Tips
Dan on eScience & Technical Computing @ Microsoft : FREE PowerPoint Twitter Tool...
Crabby Office Lady Home Page - Help and How-to - Microsoft Office Online
UK Application Development Consulting : PowerShell script to clean and zip a dir...
EMEA Dynamics CRM Support : Speeding up IIS web site access / IE throughput
Randy Miller"s Blog : Managers and Makers
DataViz
SharePoint Brew : SharePoint 2010 Logging Improvements – Part 1
Access Control: Understanding Windows File And Registry Permissions
SharePoint Escalation Team : SharePoint 2010 Granular Backup-Restore Part 2
SharePoint Escalation Team : SharePoint 2010 Granular Backup-Restore Part 1
SharePoint Escalation Team : PowerShell Intro for SharePoint Administrators - Pa...
SharePoint Escalation Team : PowerShell Intro for SharePoint Administrators - Pa...
Pat"s Application Compatibility blog : Common Issues with 32-bit Applications Fa...
Shawn Hargreaves Blog : The psychology of randomness
FrankFi"s view of the world : Random Thoughts on Leadership
Microsoft SQL Server Tips & Tricks : Unable to install SQL Server 2005 on a Wind...
Anon Bestman (newlywedsontjob) on Twitter
Twitter, Newly Weds, Electronic Bed Foolery, and The Best Man!
:: Thinstation - a light, full-featured Linux thin client OS ::
Adobe Acrobat User Community | Acrobat User Community
NANY 2010 Pre-Release: Page Countster - DonationCoder.com
David Rumsey Historical Map Collection | Google Maps
Get RekindleIT
ICANN | Committees | Security and Stability Advisory Committee
» Your DNS is an Asset (Twitter DNS Woes…) · Security to the Core | Arbor Networ...
Newpods
Inside the Trackpad: a BlackBerry Science Lesson - The Official BlackBerry Blog
Org-Mode: Your Life in Plain Text
TaskFreak! web based task manager / todo list written in PHP
WebCollab
Slashdot Comments | What Does Everyone Use For Task/Project Tracking?
But generally, my advice would be to not even try to devise a technical solution that will "keep you organized". Either you"re organized or you aren"t. If you add a complex technical solution on top of your disorganization, you"ll probably end up dealing with your technical solution in a disorganized manner and it won"t work. Get organized, then figure out a system that will help you skip over some of the more tedious steps of your workflow. Also, don"t try to put all your information into a single task list. Keep the task list simple enough that you can glance at it and see if there"s anything you can check off. If you need more information on a given task, keep a resource file somewhere else and store all the details there.
Redmine - Overview - Redmine
Nth Dimension/downloads:: Negatively discriminating against idiots since 1995!
The Open Source BPM Company | BonitaSoft
Retro delight: Gallery of early computers (1940s – 1960s) | Royal Pingdom
Making it in Japan
Welcome to TameGoesWild - The personal portal of Joseph Tame
A Year in Japan - a regular podcast from the TGW network
WiFiDog
Magical Jelly Bean Software - Magical Jelly Bean Keyfinder v2.0.1
TidBITS Networking: Improve Wi-Fi Performance in the 5 GHz Band
Create mount and copy floppy disks images under linux « A fork in the road
emtcopy
ImDisk
BlackLight
ReputationDefender : Home
LEGO Digital Designer : Virtual Building Software
Orchestrate, Integrate and Automate IT Operations Run Book Processes - Opalis So...
About Warrick
Home Improvement Blog - One Project Closer
PC Perspective - Western Digital introduces "Advanced Format"
CTX075552 - Troubleshooting ICA 32-bit and Web Client Connectivity Issues - Citr...
IBAM, the Intelligent Battery Monitor
How to Survive in IT (the soft evil skills) — Datamation.com
LinuxPlanet - Tutorials - Make Your Own Holiday Cards with GIMP - Using Your Own...
Tech Tip: Add Latitude/Longitude Information to Photos | Linux Journal
Windows 7 USB/DVD Download Tool
Wild New Design: Data Center in A Silo « Data Center Knowledge
Study finds Americans consume 34 gigabytes of information per day -- Engadget
Analyzing Malicious Documents Cheat Sheet by Lenny Zeltser
Information Technology and Security Cheat Sheet References by Lenny Zeltser
Airport Lounge Access Worldwide | Priority Pass
Script to remotely list Windows local administrator group membership « the back ...
Unix and Linux startup scripts, Part 2
Unix and Linux startup scripts, Part 1
You Can Negotiate Anything * Get Rich Slowly
CaseCruzer - Reusable Shipping & Carrying Cases
Port3101.org : Your BES Connection - Powered by vBulletin
EasyIDS
Linux Server Training Tutorials and Courses
20 years ago today...Notes 1.0
condensation on inside of windows - DoItYourself.com Community Forums
The History of the Internet in a Nutshell
Unix and Linux startup scripts, Part 1
chml: a tool to control Windows Integrity Levels
Hari Prasad"s Blog : SharePoint Planning Visio Diagrams
Simple Desktops
Ubuntu Learner » Blog Archive » DVD-drive won’t work after kernel update to 2.6....
Batch Programming Stuff
Useful commands for Windows administrators
DOS Batch - File Examples
Eyes for Lies Blog
CSEdWeek.org
Core Configurator 2.0 (Windows Server 2008 R2)
The Double-Edged Cert - Packet Life
TruePower UCS Power Outlet With Built in USB Ports - TruePower UCS Power Outlet ...
SquidTL - Time Control Limit for Squid proxy
Professor Seymour Papert
ge was
Teamwork Home Page - Work Management, Time Track , Project Management
LATRIX.ORG | HR Support & Attendance Tracking
How Robber Barons hijacked the "Victorian Internet"
About the Project and Feedbacks
MailArchiva - email archiving, email archiving software, ediscovery
ClearOS | Overview | Software
t r y ^ d :: long live free music
Understanding NIC Bonding with Linux - www.enterprisenetworkingplanet.com
PlayStation® 15th Anniversary
SecuraBit
Official Google Blog: Introducing Google Public DNS
8.8.8.8 8.8.4.4
Lickity Split
TaxTalent.com
How To: Getting VPN to work through NAT firewalls :
Adobe PDFMaker Error Message - Help and How-to - Microsoft Office Online
Microsoft Office program name has detected that your computer has a version of Adobe Acrobat PDFMaker that is known to cause instabilities in program name 2003. To resolve this issue, download an update from Adobe Systems’ Web site
The Golden Ear - TWEAK - The Windows Environment and Application Konfigurator
Main Page - Beagle
Developer Ponders Release of Linux Malware - News - eWeekEurope.co.uk
Johannes said the malware does not exploit any security holes, only loose security configurations and mindless execution of unverified downloads.
Google’s Safe Browsing Diagnostic Tool
browsersec - Project Hosting on Google Code
ratproxy - Project Hosting on Google Code
Malware Domain List
StopBadware.org - Search Badware Website Clearinghouse
Google Pack
Mango, open source M2M
Downloads « www.run-virtual.com
About the Business Software Alliance.
RoomAtlas - Book hotels from our interactive map
Tom"s Planner | Gantt Chart Software | Faster than Excel easier than MS Project
hpHosts Online - Simple, Searchable & FREE!
| McAfee SiteAdvisor Software – Website Safety Ratings and Secure Search
Google Safebrowsing
RackTablesInstallHowto - RackTables - Trac
Frugal IT — Information Technology on the Cheap!
Dimdim: Web conferencing that just works. Dimdim provides easy, open, affordable...
Free Worldwide Travel Guides - Wikitravel
Oracle Security Tools (GUI)-is a free tool, aimed to test the security of the DB...
Home (The Magic Clock)
Windows PowerShell Blog : You Don’t Have to Be An Administrator to Run Remote Po...
SVN Access Manager Documentation
CRON-O-Meter
The Electronic Discovery Reference Model
ULS Viewer - Home
Employee individual vacation record - Templates - Microsoft Office Online
J.D. Meier"s Blog : Now Available: Final PDF of the Microsoft Application Archit...
SQL Server Security : Consolidation Guidance for SQL Server
PFE - Developer Notes for the Field : Creating non-user specific printer mapping...
Hari Prasad"s Blog : Copying sites in SharePoint 2007
Hari Prasad"s Blog : Backup and Restore - SharePoint Farms, Site Collections & S...
saurabhd"s musings : Powershell:Reading the header columns in a .CSV file using ...
WebTopics : How To: Collect a Crash dump of an IIS worker process on IIS 7.0 (an...
Steven Haden"s Blog : Key Microsoft Project Resources
Imagine Think Create Share : Follow SEO recommendations in your public SharePoin...
Carpe Datum : The Magical World of SQL Server Licensing
Leading Geeks: On Interviewing
The Power Collective Ridgeblade wind turbine power generation Yorkshire
NConf - Enterprise Nagios configurator [NConf - Enterprise Nagios configurator]
netsniff-ng - Project Hosting on Google Code
Remotely Configuring DRAC Cards : Brian Desmond"s Blog
Inkscape
Graudit - Just Another Hacker
wissel.net :: Preparing for an IBM compliance audit of your Notes licences
Etherealmind - Human Network Infrastructure - cisco network design, study, archi...
Early death of Cisco VPN Client forces VPN license fees | My Etherealmind
Public.Resource.Org
CommonCrawl - About
Track down your stolen laptop – Prey
Definitely need a builtin webcam on this one.
Helpful Tips for ESI Data Mapping to Reduce E-Discovery Costs || ESIBytes
ESI (Electronically Stored Information)
TunesArt Index
Go Aruna
IE HistoryView: Freeware Internet Explorer History Viewer
MozillaHistoryView: View the list of visited web sites in Firefox/Mozilla/Netsca...
Linux.com :: Taking a load off: Load balancing with balance
Apsis Gmbh - Pound
Inlab Software GmbH - BalanceNG: The Software Load Balancer - Available for Linu...
Pen
Ultra Monkey:
Distributor
::dataBridge:: SharePoint Training SharePoint Development SharePoint Consulting
Thecus NAS ( Network attached storage ) - Storage server Leader; RAID, iSCSI Exp...
Get Apple’s MultiTouch Magic Mouse To Play Nice on Windows
Carpe Datum : Using Perfmon with SQL Server – Part Two
Virtual PC Guy"s WebLog : Hyper-V and Domain Controllers – Demo Tips and Tricks
» How To Write an Interview Followup Thank You Letter
» How to Dress for an Interview
» How to Properly Use Headhunters
» Ten Resume Mistakes You Must Avoid
» How to Write A Kick-Ass Cover Letter
Legal Holds and Trigger Events: BlackBerrys Make Legal Holds Tougher
EduGeek.net
Intern Queen Inc - The Official Website of Lauren Berger
Inhabitat
Ad.ly - In-Stream Advertising
Low-Cost Tools to Kickstart Your New Business - www.smallbusinesscomputing.com
Nimbus - Nimbus Open Source IaaS Cloud Computing Software
Berkman Center
Cloud computing security benefits, risks and recommendations
How to remotely wipe a media card in a BlackBerry smartphone « the back room tec...
Eric Lee : Scrum Is Not About Tools
Galaxy Zoo 2
Pulse 2
The Backup Blog: Avamar v5.0
Nikon Nikkor Lenses
Windows 7 Resource Kit - Unofficial Support Site
Bob"s Blog : The IT Complexity Crisis: Danger and Opportunity
Eric Kraus" SharePoint/.NET Blog : Automated SharePoint 2010 Install with PowerS...
Five improvements for IT managers in 2010 | IT Systems News - Betanews
The Unix Power Classic: A book about the Unix Way and its power
Information Technology Standards Committee
Here Be Dragons: An Introduction to Critical Thinking
Best practices for setting up a Windows print server
Windows Server 2003 Print Services
Drive Snapshot - Kommandozeile
Tiny PE
MileTrak in Launchpad
bigsync - Project Hosting on Google Code
Ed Brill
Lotusphere on $5 a Day (sort of) by The Turtle (Scott Wenzel)
msgoodies: PS Remoting to Home Server
MailArchiva Email Archiving & Email Compliance Features
untitled
How to uninstall the Adobe Flash Player plug-in and ActiveX control
More Fun With Bash Quoting | Linux Journal
Visualizing Stackoverflow"s data dump - O"Reilly Broadcast
The Copier Network
Downloads : NETGEAR ReadyNAS Community
How to Easily Monitor System Performance with the new DiskLED 1.1 « Helge Klein
Yabs - Yet another Business Software
PesterCat : Web Testing - Home
PowerFolder | freshmeat.net
Endeavour Software Project Management
Déjà Dup in Launchpad
http://jttslite.sourceforge.net/
SourceForge.net: VisualDB - Project Web Hosting - Open Source Software
The DIY Zoning Project
25 best quotes from tech history
chosaq
DPC Latency Checker
Schneier on Security: Laissez-Faire Access Control
Install Twiki on a Debian 3.1 box - Quantact
Secure-24 - SAP Managed Hosting Services
Script to find and email files in a directory « the back room tech
Share Book Recommendations With Your Friends, Join Book Clubs, Answer Trivia
Welcome to Shelfari! Read, Share, Explore! - Shelfari
Clay Shirky"s Internet Writings
The Ethical Hacker Network - Cool and Illegal Wireless Hotspot Hacks
Synergy Recycling - Mayodan, NC
Windows PowerShell Blog : I Can Do That With 1 Line of PowerShell: Installed Sof...
LeanPM | Get LeanPM at SourceForge.net
CosmoLearning | Your Free Online School: Courses, Video Lectures, Documentaries,...
Which PM Methodology is the “Right One” for Your EDD Project? « Electronic Disco...
The Project Management Tip You Can’t Ignore » The Rapid eLearning Blog
SQL Server Setup : SQL Server 2008 Discovery Report
CSS SQL Server Engineers : How It Works: How many databases can be backed up sim...
LogIn SDK - Windows SDK team blog : Steps to sign a file using Signtool.exe
The ShiSh List : Sharepoint 2007 Planning Tools/Resources
Security Tools : Some New Software Security Tools for Web Developers – (CTP Rele...
In search of simplicity, quality and tranquility in software engineering : Chatt...
basqet - Project Hosting on Google Code
Kimai - Open Source Time-Tracking
Microsoft Access Performance FAQ
Japanese - Pimsleur Study
Remus
How To Easily Automate Backing Up Your Wordpress Blog
Encours: Real-time interactive presentations
Logic Circuit official web site
Doc Searls Weblog · Colors of salt
Aprigo- SaaS IT Management Essentials | aprigo
Unix, Linux, Mac OS X Help, Tutorials and support pages
LinuxPlanet - Tutorials - Character Sets in Linux or: Why do I See Those Weird C...
SocialCatz, True Social Media Marketing Solutions
USB Switchblade - Hak5
ique of
CoTweet™ - How business does Twitter
IT Training and Consulting - SharePoint, Project Management - Springhouse Educat...
Main Page - mRemote
SharePoint Brew : PowerShell Intro for SharePoint Administrators - Part 1
Xbox-Scene News: Xplorer360
Layer 2 Network Protections against Man in the Middle Attacks
SourceForge.net: Wrapper for AWK providing modules - Project Web Hosting - Open ...
TuxSoft - Products
RipIt - a command line audio CD ripper
ecoATM-web-final
The Postini always rings twice (Page 2)
Technology Explained: What Is Bluetooth?
Introduction to iSCSI | Linux Magazine
Creative Cleaning with Everyday Products * Get Rich Slowly
Beginner"s Guide to Linux Desktops Backups: Basic Strategies and Tools
Allan"s Best Week Ever : SharePoint 2010 Tree of Life – Resource Roundup
Random Musings of Jeremy Jameson : A Simple Backup Solution
Nick MacKechnie : Microsoft Assessment and Planning Toolkit 5.0 Community Techni...
8 Free (and 4 cheap) Things to Do in Auckland with a Toddler | Wise Bread
LyX | LyX – The Document Processor
CDI - Center for Defense Information - Security Policy Research Organization
Disk Benchmark | ATTO Technology, Inc.
SaaS vs. On-Premises Solutions Considerations | Lotus Journal
All The Best Organizing Solutions In The Organizer"s Toolbox -- OnlineOrganizing...
h+ Magazine | Covering technological, scientific, and cultural trends that are c...
What DNS Is Not - ACM Queue
DNS (Domain Name System) is a hierarchical, distributed, autonomous, reliable database. The first and only of its kind, it offers realtime performance levels to a global audience with global contributors. Every TCP/IP traffic flow including every World Wide Web page view begins with at least one DNS transaction. DNS is, in a word, glorious.
ImageMaster
lessfs
Legend of the seeker.org - Fansite for the Legend of the Seeker / Sword of Truth...
Creating Ebooks with Sigil - Linux Magazine Online
Dashboard
WordPress › WordPress Exploit Scanner « WordPress Plugins
Insider threat: The snapnames case
404 - File or directory not found.
Terry Zink"s Anti-spam Blog : The Story of Conficker, part 2
Terry Zink"s Anti-spam Blog : The story of Conficker
extendedsubset.com - Renegotiating TLS
Tokenless Two Factor Authentication | Multi-factor Strong Authentication
Links » Another Protocol Bites The Dust
MINTS - Minnesota Internet Traffic Studies
pnp-0.6:start [PNP4Nagios Docs]
Apple’s Magic Mouse — First Impressions
Download details: Office 2003/XP Add-in: Remove Hidden Data
Process Visualization Browser ( pvbrowser ) SCADA
MBLogic
Postini Help
VolkerW"s WebLog : Server Room to Datacenter To Compute Container
Online Tool for URL Encoding/Decoding
Random Musings of Jeremy Jameson : Deleting Empty Folders
Timetonote - Free, Simple, Fast and Elegant CRM
UMPCPortal - Ultra Mobile Personal Computing
CAINE Live CD
StartSSL™ Certificates & Public Key Infrastructure -
UGENE - Integrated Bioinformatics Tools
BioRails.org
Bioclipse - Home
Free network tools for system administrators
Description of the Windows Management Framework on Windows XP, Windows Server 20...
Sortable Table JavaScript: Sort your tables easily!
msgoodies: DFS, IPv6 and – sort of – disabling it
Zip and UnZip Files Using the Windows Shell (XP, Vista, 2003 and 2...
"The compression cannot be performed because the size of the resulting Compressed (zipped) Folder is too large."
Droid Explorer
SmartTools for SharePoint
svchost viewer
Performance Analysis of Logs (PAL) Tool
Requires Log Parser http://www.microsoft.com/downloads/details.aspx?FamilyID=890cd06b-abf8-4c25-91b2-f8d975cf8c07&DisplayLang;=en
Business Information and News: Track, Connect and Share - Tracked.com
Keeping the Door | All you can eat sci-fi and fantasy books
GPSBabel: convert, upload, download data from GPS and Map programs
Powershell Get Inventory Script
Windows PowerShell Owner"s Manual
PowerShellPack - Release: PowerShellPack (Setup)
How to reserve a range of ephemeral ports on a computer that is running Windows ...
Daniel Schneller"s Blog: Windows: TCP Port conflicts above 1024
Chuck"s Blog: Ten Things I Wish We Did Better As An Industry
Dreaming in PowerShell - PowerShell.com
Windows PowerShell Blog : Quick, Dirty, Super-Useful Scripting
Free Online Computer Science and Programming Books, Textbooks, and Lecture Notes...
Ken Schaefer : Using PoolMon (Pool Monitor) to debug kernel memory leaks
Factory Reset Nortel IP Phone | Michael McNamara
Free Utilities! - Trigeminal Software, Inc. (English)
How to replace Microsoft software or hardware, order service packs and product u...
Progressive Development : Motley says: “To prepare for an interview, just make s...
Progressive Development : Motley says: "To prepare for an interview, just make s...
Slightly humorous when the microsoft factor is added in
Lifehacker"s Complete Guide to Windows 7 - Windows - Lifehacker
AnandTech: Windows 7 Performance Guide
Windows 7: The Complete Guide - Windows 7 guide - Gizmodo
Syslog Summary Script - Terry"s Blog
80/20® Inc. - The Industrial Erector Set®
Nightly Business Report . Your Mind and Your Money | PBS
Orchestra: Open Source BPEL / BPM Solution - Orchestra : The Open Source BPEL so...
Rule engine integration with Nagios using NodeBrain | An It-Slave in the digital...
Household Register 2010 - Conduct Home Inventory
Chirashi Security
Yahoo!翻訳 - テキスト翻訳
Masonry Magazine: Mortars & Mixtures
A new Adore root kit [LWN.net]
Time-of-check-to-time-of-use - Wikipedia, the free encyclopedia
My Tech notes: Linux SMB write performance With Simple Tips
How to Troubleshoot Black Hole Router Issues
UrlScan 3.1 : Wade Hilmo : The Official Microsoft IIS Site
Network Weathermap | See Everything - Current Release v0.96a
gnetworktester | Get gnetworktester at SourceForge.net
CAADR | freshmeat.net
John Kristoff - Software
Category:OWASP WebScarab Project - OWASP
Category:OWASP Project - OWASP
Monitoring Cisco IOS versions with Nagios through SNMP
Twitter: Best Practices and Tips [PDF Guide]
The Hacking Mood › Mirroring Project Gutenberg’s Etext
mySAP Knowledge Base: SAP on Windows
Cindy Gross - Troubleshooting, tips, and general advice about SQL Server : Check...
Cindy Gross - Troubleshooting, tips, and general advice about SQL Server : Consi...
DeveloperS : Sample tool for testing Secure FTP Server
Engineering Windows 7 : Engineering 7: A view from the bottom
Small Basic
darktable | about
Conflict History
Employee Benefit Research Institute | EBRI
Home | NewJerseyNewsroom.com -- Your State. Your News.
Onsite Technology Solutions - Windows Live
SharePoint Farm configuring and deployment. Part 1 Architectural and Logical Pl...
Ence Certification Program
DB Fletcher Design
Scott Hanselman"s Computer Zen - Scott Hanselman"s 2009 Ultimate Developer and P...
SharePoint Brew : SharePoint 2010 Granular Backup-Restore Part 1
ReturnProxy.com - The Practical Proxy PAC file guide
OpenPSA - MidgardWiki
pyOBD - Open-source OBD-II diagnostics
Description of Transport Neutral Encapsulation Format (TNEF) in Outlook 2000
Welcome to Fentun"s Home Page
tnefclean home page
Bet you havent seen this before osk? | Ask The Admin
Gefen Inc. - Specializing in HDTV, HDMI, DVI, USB, Cables, HD-SDI, VGA and KVM S...
The Blog of Ben Rockwood
Free Document Management Software DMS - OpenDocMan
sanbarrow.com
WSUS Offline Update - Update Microsoft Windows and Office without an Internet co...
WVE - Wireless Vulnerabilities and Exploits :: index
DiskLED – A Flexible Hard Disk and General System Activity Indicator System Tray...
Upgrade from SQL Express 2005 to 2008 - Windows Live
SQL Server Setup : Creating a merged (slipstreamed) drop containing SQL Server 2...
SourceForge.net: Locksmith - a password changing website - Project Web Hosting -...
The Newspaper Guild
Greenbone: Company Overview
National Novel Writing Month
Nick MacKechnie : Scareware and Malvertising
Terry Zink"s Anti-spam Blog : Best practices for sending outbound mail
PowerShellPack - Home
Stephen P. Tarzia"s webpage
OpenDisc
What TCP/UDP ports does Backup Exec for Windows Servers 11d and above (including...
Backup Exec FAQ
Backup Exec License Assessment Tool | Symantec Connect
SVNBackup – Incremental Backup and Restore Utilities for SVN » The Wacky World o...
CrypTool - Educational Tool for Cryptography and Cryptanalysis
Dock-a-Mac for the MacBook
Presonic & Co - Prescanic
Sysinfo.org
News — Asterisell
WWW Tech Support/WinBatch/System Info\Detect a Laptop.txt
DeveloperS : Kerberos SPN Viewer and Helper Tool Sample
Microsoft Project Team Blog : Dealing with organizational resistance
The SharePointer : SharePoint Alerts/Emails Don"t Work on some VMWare Systems
Time Tracker v1.0 - Open Source Efficiency Tracking Utility for the Lotus Notes ...
OpenInkpot
» DNS-Test :: Free dns checking tool script! » Corpocrat Blog
Get more battery life out of your laptop in Windows 7. | The Windows Club
powercfg -energy -output c:UsersACKDesktopPower_Report.html
Home | The Linux Foundation
Common Criteria - The Common Criteria Portal
Altiris Blog Site: Scheduled tasks Disabled: Danger of installing additional com...
delete all (NS) scheduled tasks except the NS.Weekly.GUID. Enable this task and run it. It will recreate all schedules.
good_cheap_fast.jpg (JPEG Image, 430x323 pixels)
Go track yourself | Linux Journal
Sauron - A Free DNS & DHCP Management System
Timo Kokkonen - Projects
VMware Knowledgebase Weekly Digest
The UK Higher Education Blog : What features are in which version of Windows 7?
Moon › Japan Today: Japan News and Discussion
CeeVee - quick & painless résumé management
Hacker
VMware Self-Service- Increasing the Write Timeout Value for Conversions to ESX D...
VMware Self-Service- Investigating network devices and device settings as a caus...
How to find and run the Inbox Repair tool in Outlook
Nagios & Ubuntu 9.04 – Part 2
Crazy Advanced Mod_Rewrite Tutorial
Cisco Port Security and Sticky MAC Addresses
Video screen capture (ScreenCast) AviScreen
Free Trademark Search Online | Protect Business Name | Interesting Name Ideas | ...
IBM Lotus Notes and Domino licensing
IBM Lotus Notes and Domino - Client packaging
Sonic Visualiser
sslsniff
sslstrip
The Daily Beast
The Tech - MIT"s Oldest and Largest Newspaper
Clare Bayley » Blog Archive » My very own MIT admissions essay
Base64 Decoder
organic fertilizer: list domain controllers with powershell
What’s the difference between free ESXi and licensed ESXi? | VM /ETC
Ten ancient Greek tips for coping with our high-tech world - Times Online
Project Management Redux « docNative Paradigm Blog
Nice Sharing - Combine Multiple URLs into single URL
Moomeo
OpenNTF.org - kNBackup
FAX Server, Document Process Automation, Procure-to-Pay & Order-to-Cash Solution...
Virtual Worlds Productions - Software Development Group
Groowiki web site
Right mouse click keyboard shortcut « the back room tech
Install and Configure Apache2 with PHP5 and SSL Support in Debian Etch -- Debian...
My SysAd Blog -- Unix
Hivelogic - The Anti-Spam Email Address Enkoder
A List Apart: Articles: Graceful E-Mail Obfuscation
Country codes & international area codes - HowtoCallAbroad.com
Ubuntu Tips - Boot Faster (Page 1 of 4) - LinuxLinks News
Best Practical: RT: Request Tracker
triage - Project Hosting on Google Code
Kamishibai
Storycard Theater / Home
Kamishibai for Kids: Homepage
OpenOffice templates, tutorials, tips and FAQ
namebench - Project Hosting on Google Code
Online Learning Basics
Presentation Zen
Lean Manufacturing Blog, Kaizen Articles and Advice | Gemba Panta Rei
Barrelfish
Eric Meyer: CSS
CN=Monitor LDAP Monitoring
ComputerEcology: Linux-Ecology-HOWTO
Clean CSS - A Resource for Web Designers - Optmize and Format your CSS
DeSmuME - Nintendo DS Emulator
Gist
BackupPC Information
SoftHSM – OpenDNSSEC
Dietary Guidelines for Americans
Mac Repair - Powerbook Parts, Powerbook Repair, iBook and Macbook Upgrades - Pow...
Using our spam blacklists (2005-07-11)
Subversion Cheat Sheet
Ask the Directory Services Team : Troubleshooting KCC Event Log Errors
Siptrack
wissel.net :: New Desk for my Study
One Art - Poets.org - Poetry, Poems, Bios & More
Baobab
Virus, Spyware & Malware Protection | Microsoft Security Essentials
Wallpaper Generator - Home
Charl van Niekerk » Blog: Setting up commit-email.pl
Visio Guy » Visio Network Server Shape Icon Customization Tool
Microsoft"s New Certifications: What They Are, Why They Matter
Terry Zink"s Anti-spam Blog : How to reclaim your sender reputation - Introducti...
Aaron Stebner"s WebLog : Mailbag: How to manage reboots when installing multiple...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
SUA Community: Microsoft Windows Subsystem for Unix-based Applications, Interix ...
organic fertilizer: list active directory subnets with powershell
A Three Page Order Hitting De-Duplication & Litigation Holds « Bow Tie Law’s Blo...
CSS Compressor - Online code compressor for Cascading Style Sheets
Security Fix - Clampi Trojan: The Rise of Matryoshka Malware
Clampi/Ligats/Ilomo Trojan - Research - SecureWorks
Inside the Jaws of Trojan.Clampi | Symantec Connect
How to manually edit the Boot.ini file in a Windows Server 2003 environment
Stager – Trac
Samhain Labs | beltane
invalid boot.ini loading from c:\windows
Virtual Mac Tool « www.run-virtual.com
Overcoming Depth of Field Problems in Portraits
HowardForums: Your Mobile Phone Community & Resource - *The Definitive Shortcut ...
Humor... ???
find examples
ActiveSync Problem Solving
All about the various PC power supply cables and connectors
Newegg - Power Supply Calculator
Connecting 20-pin ATX PSU to 24-pin Motherboard
unpaper 0.3
Introduction to FTDI bitbang mode - Hack a Day
Essential Personal Finance E-Books * Get Rich Slowly
Moserware: A Stick Figure Guide to the Advanced Encryption Standard (AES)
Cool Windows Resource Kit Utility: cleanspl.exe
SILC Secure Internet Live Conferencing
SecPanel
EWG Home | Environmental Working Group
Project 10 to the 100
Software Protection. Update Remove Driver
Riverdrums Load Balancer | Get Riverdrums Load Balancer at SourceForge.net
The Geek Code
JD Supra | Legal Documents, Legal Forms, Court Filings, Articles & Research by t...
Webmaster Tools
wikicrowd - Project Hosting on Google Code
Synthesizing Voice From the Command Line | Linux Journal
AsterFax Home - Email to Fax Gateway for Asterisk
AppKonference | Get AppKonference at SourceForge.net
Copyscape - Search for Website Plagiarism and Duplicate Content Online
Creating a Dialplan in Asterisk 1.6: Part 1
Released Versions of Windows Installer (Windows)
Justkez » VBScript and Excel
Windows Essential Business Server 2008: Preparation and Planning Wizards
VMWare ESX: static MAC address « Networknet.nl Blog
YAPP - Yet another PDP-11 Page
IVR Hacks: Shortcuts for company IVR systems, IVR services and Call Centers
synergy-plus - Project Hosting on Google Code
BizTalk Musings : Creating Certificates
Microsoft SharePoint Team Blog : Patching a mirrored farm with minimal downtime
From The Northern Edge Of Microsoft : Announcing New Tools for IT Professionals ...
EricLaw"s IEInternals : Understanding Domain Names in Internet Explorer
Habib Heydarian"s Blog @ Microsoft : Coverage of the Visual Studio 2010 Historic...
SQL Server 2008 Spotlight on Cost | Microsoft
Baralga - your open source time tracking solution! | Baralga
webcast.berkeley | UC Berkeley Video and Podcasts for Courses & Events
TechChatter: Excel Scroll Problem - Scroll Lock
Michael McNamara
DHCP Options (VoIP) | Michael McNamara
DHCP Options (VoIP) Part 2 | Michael McNamara
Slaptijack | Networks – Systems – Coding
GeekoZoid...: How to duplicate / clone virtual machine on VirtualBox
Data Center Power Outage | Slaptijack
Slaptijack was offline for 2.5 hours today when the data center with our server in it experienced a power outage. Apparently, the roof started leaking during a heavy rain storm and water dropped directly on a panel controlling the UPS. This caused the UPS to shutdown, and it took 2.5 hours for the data center personnel to bypass the UPS and put all customers onto very interruptible city power. So far, there have been no more outages since power was restored, but there may be downtime when customers are moved off city power and back on to the UPS.
5 Ways To Rescue Your Rotten Résumé * Get Rich Slowly
agenda2pdf | freshmeat.net
Chuck"s Blog: Chargeback Vs. Pricing
A guide to the Grc.dat file in Symantec AntiVirus Corporate Edition 8.x and 9.x
Configed.exe
Server configuration management: track changes with subversion and be notified -...
On-Demand Spend Management Solutions | Spend Analytics, Strategic Sourcing, Cont...
start · NeDi
Main Page - OneCMDB
MonitoringForge: Network Management Software
SecurityTube - Watch, Learn and Contribute Computer Security Videos
Main Page - Diegostart
Main Page - Bran
Howto Crack Zip Files Password | Ubuntu Geek
How to enable SNMP on a VMWare ESX Server - Geek Speak Blog - thwack
OSF DataLossDB | Data Loss News, Statistics, and Research
SourceForge.net: IIS Emulator - Project Web Hosting - Open Source Software
Charges on your phone bill
iStand on Flickr - Photo Sharing!
hierarchy_distractions_960.gif (GIF Image, 960x1019 pixels) - Scaled (92%)
[ExportZone] Backup Internet Explorer Zonemap domains listing
Welcome to iPod Nano Linux !
Phrases.net
HealthGrades - Research Hospitals, Doctors and Nursing Homes
Microsoft: Windows 7 upgrade can take nearly a day (Updated) - Ars Technica
Returning Values from Bash Functions | Linux Journal
OpenShot Video Editor: Screenshots
MobileRead Forums
epubBooks: FREE eBooks in the EPUB format for your iPhone, Sony Reader, and many...
DailyTech - Pirates Foiled by Deliberate Glitch in Batman: Arkham Asylum
An Edios admin going by Keir responded to the thread before it was closed writing, "The problem you have encountered is a hook in the copy protection, to catch out people who try and download cracked versions of the game for free. It"s not a bug in the game"s code, it"s a bug in your moral code."
Kitco - Ship to Kitco
WinToFlash - Install Windows from usb - Home page
Fast and Reliable Backup and Restore of VLDBs in SQL Server 2008
Remote Desktop Services (Terminal Services) Team Blog : Multi Monitor support in...
Home Page – esySoft
Google Book Downloader - Home
inumbr:: Auto expiring. FREE anonymous phone numbers for online safety.
Thoughts about this DIY-Thumper and storage in general - c0t0d0s0.org
RBridges integrated to Opensolaris Build 124 - c0t0d0s0.org
Build Your Own PBX With Asterisk and Linux - www.enterprisenetworkingplanet.com
Legal Technology - Commentary: Linux at Law
UNIX network performance analysis
Camera Life - A PHP Powered Online Photo Gallery Manager
Cowtacular LLC - Home
Do It Yourself Digital Camera Repair
SMB Traffic Analyzer « hhetter"s blog
Understanding Windows 7 Themes, Inside Out
http://wa5znu.org/2009/05/marauders-map/
10 Levels of Intimacy in Communication
CK-12.org
Inside Office Online blog : Demystifying Visio
Karan"s WebLog : SQL Server Analysis Services Port (SQL 2005 / 2008)
Magician Marco Tempest - Technoillusionist
Security Alerts at UVa
VA SCAN :: Virginia Alliance for Secure Computing and Networking
Microsoft Baseline Security Analyzer 2.1 Frequently Asked Questions
DAD | Get DAD at SourceForge.net
Security Tools Detection Assessment Malware Protection Update Management
Erlandsen Data Consulting » Blog Archive » Find Lost Or Forgotten Passwords
Under The Stairs
BSonPoSH » Command line guide for Server Core
nbtscan - NETBIOS nameserver scanner
Melvin’s Citrix Blog
Security Technical Implementation Guides
ClayPit
F D C C
Federal Desktop Core Configuration
FFFF - Fast Floating Fractal Fun | Get FFFF - Fast Floating Fractal Fun at Sourc...
PHMSA - Risk Management Self-Evaluation Framework (RMSEF) - RMSEF Security Templ...
Router security template - CT3
askthemct.com » Groups, Groups and More Groups
Password Policy / Password Filter for stronger Windows Passwords
SpartX - Virtual Business Card - A networking tool for the 21st century.
Official Seal Maker
Custom Electronic Enclosures for Engineers and Designers
Songbird - Open Source Music Player
OpenNTF.org - Client Level Tracking
SIP: Session Initiation Protocol -- 911
Articles - Additional Bluetooth Drivers for Microsoft Bluetooth in Windows XP SP...
How to troubleshoot Bluetooth detection and connectivity problems in Windows XP ...
Wi-Foo - The Secrets of Wireless Hacking
Downloads
trifinite.org - the home of the trifinite.group
BlueZ
Aruba Labs
Bluescanner
Bluesniff - Proof of Concept Bluetooth Wardriver
SecuriTeam - RedFang, Bluetooth Discovery Tool
ZigBee Alliance
Adrian Dimcev"s Blog |
KolibriOS - News
Polarhome - gateway to freedom
50 Fantastic Bing Tricks for Students & Librarians | Online Colleges
The Organization of Legal Professionals - Home
Home - iss.thalesgroup.com
The Deathrow OpenVMS Cluster
SDF Public Access UNIX System - Free Shell Account and Shell Access
The Timeline Project
IT Career Crisis Management: Five Lucrative Areas — Datamation.com
Green Data Center Blog
Free Management Library
phrasen|drescher - Portcullis Labs
OVAL - Open Vulnerability and Assessment Language
Green Dam Youth Escort - Wikipedia, the free encyclopedia
Hack Canada - It don"t mean jack if it ain"t got that hack.
Hping - Active Network Security Tool
.:[ packet storm ]:. - Legion by Rhino9
Circos - visualize genomes and genomic data
Honeybrid
Ether: Malware Analysis via Hardware Virtualization Extensions
HoneyBOT
Argos - An emulator for capturing zero-day attacks
Developments of the Honeyd Virtual Honeypot
Tool Release - Minionz - "VirtualBox Sandbox automation" | Australian Honeynet P...
Honeynet Project Blog | The Honeynet Project
Picviz - Trac
REBOL Technologies
The Ethical Hacker Network - Metasploit™ Tutorial - A New Day for System Exploit...
Viruslist.com - Information About Viruses, Hackers and Spam
rootkit.com
NEOHAPSIS - Peace of Mind Through Integrity and Insight
The Kevin Mitnick/Tsutomu Shimomura affair
Words and pictures from Silicon Valley by Chris Gulker — www.gulker.com www.gulk...
SystemTools.com - Windows NT/2000/XP/2003 System Management Software
WebScarab - a web application review tool
Flash Cookies explained
WebReaper - Introduction
Ghostery
Information Commissioner"s Office - ICO
How to Keep a Digital Chain of Custody - CSO Online - Security and Risk
IT Security Office | Docs
Rancid - The Easy Tutorial - Tutorial
:: Virus.gr :: | Antivirus programs and protection guide, virus info, antivirus ...
Computer Crime
Windows (In)Security
Custom Manufacturing, Hardware, Rubber and Plastics guides on ThomasNet
Bilboblog, a free micro-blogging php application - Tux-planet
barry | Net Direct Inc.
Job Vacancies in United Nations and International Organizations
State Farm leases 12,000 sf at Teleport II on Staten Island. (State Farm Mutual ...
Staten Island University Hospital to utilize Teleport Communications Group for i...
Sad situation" at struggling Teleport - SILive.com
Borough President Molinaro proposes redevelopment of Staten Island"s Teleport - ...
Commercial Property: The Teleport; Moving Ahead Off the Beaten Path in Staten Is...
Teleport Communications Group Alumni
iLocus: Market Research in Emerging Telecommunications
Google Flu Trends
Yugma, Free Web Conferencing, Online Meetings, Web Collaboration Service, Free D...
LicenseCrawler
Windows Backup With Rsync and FreeNAS
Technology FLOSS: dhcp-lb: Load balance with DHCP links
How to Set Up a "Site Down for Maintenance" Notice with Apache
Make: Online : The making of a flash drive
microISV: a community for independent software developers
MalwareURL.com
IBM - Mail database failover conditions in a Lotus Domino clustered server envir...
Wireless Security 802.11 Security Wirelessdefence.org Index
Differences Between Several Universal Printer Solutions
Canon U.S.A., Inc. Drivers & Downloads imageRUNNER
SAP®:SAP Device Types for Canon Devices
gogglesmm - Project Hosting on Google Code
Organizing feature
gracedm - Project Hosting on Google Code
SVNManager - PHP Subversion Repository Administration - Introduction
Duffbert"s Random Musings :: Guest Post: Worrying is Not a Business Plan by Albe...
Usability Views - 11,002 articles about usability, accessibility, IA, HCI and we...
Simply Google
Beloit College Mindset List
An Abbreviated History of ACP, One of the Oldest Open Source Applications
ICMPTX (IP-over-ICMP) HOWTO
SQL Server Version - SQLTeam.com
NagiosGrapher - Doc - Open Source Data Center Solutions
Jose Barreto"s Blog : Microsoft File Server Migration Toolkit 1.2 available as a...
Jose Barreto"s Blog : Experimenting with PowerShell v2
Ask the Directory Services Team : Which KB articles resolve the most Directory S...
Windows Virtualization Team Blog : Windows Server 2008 R2 Core: Introducing SCON...
» Citrix XenApp ICA Client Installation, Tuning and Troubleshooting Guide - JimM...
Roaming user profiles and FSRM File Screening
AdminSDHolder, Protected Groups and SDPROP
Jose Barreto"s Blog : File Server Capacity Tool (FSCT) Release Candidate availab...
FSCT
Technology Explained: How Does A Hard Drive Work?
Quick and Dirty MySQL Performance Troubleshooting | Linux Magazine
Live Ships Map - AIS - Vessel Traffic and Positions
Bust-A-Drive
HAR2009
SharePoint Business Intelligence : SharePoint in plain English
The Best Way To Effectively Clean LCD Laptop & Monitor Screens
Flexr 1.0.11
SOFA Statistics Open For All - Home Page
FLURB, a Webzine of Astonishing Tales.
How To Download Games Onto Your PSP For Free
Cooking For Engineers - Step by Step Recipes and Food for the Analytically Minde...
Microsoft SMB Community Blog : Windows 7 and Windows Server 2008 R2 Volume Activ...
Tips, Tricks, and Advice from the SQL Server Query Processing Team : Understandi...
Computer Science Teacher - Thoughts and Information from Alfred Thompson : 15 Fr...
Nicholas Allen"s Indigo Blog : Using TCP Analyzer to Debug TCP Performance
Stuart Leeks : PowerShell script to clean and zip a directory
SQL Server Setup : Microsoft Update Guidance for SQL Server
Cesar de la Torre - BLOG : How To Install Windows 7 From a bootable USB Drive
NIL - Data Center Interconnect
uTodo - FREE, simple and fast to-do list and GTD software
Track Tropical Depression Claudette, Track Tropical Storm Ana, Track Tropical St...
Electronics Engineering Video Blog Podcast
Integrating Asterisk with Wireless Technologies: Part 1
Podcasts for Cyber Security Professionals
Tera-bug « Oracle Scratchpad
The Day Before Zero
Chicago Tech News » Blog Archive » Accounting For Twitter and Web 2.0 From a Leg...
Technical Bedtime Stories
Recession-Proof Graduate
mySAP Knowledge Base: Checking on installed Oracle patch collection
Home
Wepawet » Home
Forensically interesting spots in the Windows 7, Vista and XP file system and re...
Tweet Sentiments - Know Who"s Tweeting About What When Where & How
Klout - Twitter Analytics - Measuring Influence Across The Social Web
Homepage of Daniel Roggen - SynScope - Signal Visualization and Alignment Tool
Law Practice Technology Information Sources and Tools | LLRX.com
Tatjana van Vark ~ Main page ~ Welcome
TCP Performance and the Mathis Equation - Terry"s Blog
Academic software for research papers | Mendeley
FTC - SPAM - Home Page
Free owners manuals, user guides & how-to instructions | ManualsOnline
The Holding Pattern: Lessons Learned on Litigation Holds « Bow Tie Law’s Blog
Cheat Sheets - PacketLife.net
Product Configurator - Xorcom
Download details: Remote Server Administration Tools for Windows 7
Five favorite PowerPoint tips | Business Center | Working Mac | Macworld
Tools to Monitor DNS -- Microsoft Certified Professional Magazine Online
Circuit Symbols of Electronic Components
Ten Tips for Domino Administrators - O"Reilly Media
Oleksandr Tymoshenko’s blog » AudioBookBinder
PacNOG: The Pacific Network Operators Group
Hack to Remove/Uninstall Symantec Norton Antivirus (SAV) Client without Password...
GIG Gruber Ingenieurgesellschaft mbH (Hauptseite IT-Bereich)
The Big Picture
Lessons Learned : PowerShell for N00bs 1: Hello, World
Lessons Learned in 10 Years of Supporting Exchange : Understanding and Recoverin...
Lessons Learned in 10 Years of Supporting Exchange : Troubleshooting 101- Defini...
Microsoft Dynamics CRM Team Blog : Configuring Service Principal Names
Nicholas Allen"s Indigo Blog : Windows 7 (and Orcas SP1) SDK Released
SQL Server Setup : SQL Server 2008: “Could not fix registry key” Issue and how t...
FundAdvice.com - The Ultimate Buy-and-Hold Strategy - 2009 Update
List of error codes and error messages for Windows Installer processes
Whitetrash: Dynamic Web Whitelisting for Squid
the back room tech
Keyboard shortcuts for Windows
Installing "Sugar on a stick" (Strawberry Release) On A USB Stick | HowtoForge -...
Writing Flow | Men With Pens
GoldenPod
Piggydb - A knowledge creation system
SQL Benchmark Test Suite in Launchpad
Online Certificate Programs -- O"Reilly School of Technology
There’s No “I” in a Great System Administration Team | Linux Magazine
adx - addressbook.xml
5 Excellent Downloadable eBooks To Teach Yourself Linux
Sweet Home 3D
Mobile Device Management and WLAN Management Software - AirWatch
Nabble - WPKG - Users - More ways of defining hosts in hosts.xml - startup, logo...
Visio Guy » Automatic Chevron Process Shape
IBM - Domino server console command abbreviations
Lotus Sandbox - Lotus Notes Diagnostic Tool
Google Map Buddy
Switch hardening on your network
Celtx - Integrated Media Pre-Production
GanttPV - Open Source Software for Project Management
osTicket:: Open Source Support Ticket System
Large Text Compression Benchmark
Ask the Directory Services Team : Machine Account Password Process
VMware Self-Service- Virtualizing existing domain controllers
Baseline Registry Settings for new Domain Controllers : Brian Desmond"s Blog
Information about TrendMicro | ITStuff is all about Win, VMware, Hyper-V, Server...
Install Windows Components from Command Line - Network Administration & Consulti...
1wire attic cooling at Raging Computer
Dover Projects: How to Insulate Basement Rim Joists
Robert McMurray"s Blog [MSFT] : Automating IIS 7 Backups
"Tuner Blog
Lotus Notes and Domino wiki
Informatik IV: Containing Conficker
The H Security Conficker information site - The H Security: News and features
Emmanuel Bergerat"s blog on SharePoint : The checkbox that saves you hours
Remote Desktop Services (Terminal Services) Team Blog : RD Gateway deployment in...
9 Useful Strategies to Dealing with Difficult People at Work - Dumb Little Man
organic fertilizer: “mid” like functionality in batch script
Wolf Software
SAM - Overview - Redmine
Nozbe - getting things done gtd software task manager and to-do list for project...
Toodledo :: A to-do list to organize your tasks
Download Hulu clips, episodes and videos ( hulu.com ) to your PC, Ipod, Zune, PS...
CoovaAP | coova.org
OpenDNSSEC
Get back the ctrl-alt-backspace behavior in Ubuntu
Beyond the hype: Where open source actually saves you money | The Open Road - CN...
Recovering Catalyst Fixed Configuration Switches from a Corrupted or Missing Ima...
A California city rebuilds network using all open source software - Network Worl...
H.323, Firewalls, NAT, and the Meaning of Life
Firewall ports to open for video conferencing
H.323 Firewall Riddle
H.323 Videoconferencing and Firewalls | Video | Technical Support | MOREnet
Video Conferencing Interoperability Problems
Introduction to H.323 Packet Activity & Troubleshooting
Firewall IP Ports and Protocols used by H.323 video conferencing systems
Asterisk :: The Open Source PBX & Telephony Platform |
Centritech Communications Systems -- Asterisk-Based VoIP PBX Phone Systems
Jared Smith - Asterisk Consultant
Trader"s Little Helper
Make the most of large drives with GPT and Linux
Altiris Blog Site: NS6.0 Common problems for very large environments
Homepage, PDF Tools from Dirk Paehl
Phone Number Comments
How to Convert a VMware Pre-allocated Virtual Disk to a Growable Virtual Disk - ...
Ketarin - keep your setup packages up to date
Audio File Formats Explained in Simple Terms
Documentary Heaven :: Food For Your Brain
msgoodies: A useful Test-Host Function
Steal This Book
Writer"s Café fiction writing software - novels - screenwriting - short stories ...
MirrorBrain | Welcome!
MySQL Sandbox: Treat MySQL Instances like Virtual Machines | Linux Magazine
NetApp Technology Network: vmdkdtool - A tool to create or repair virtual disk h...
VMware Self-Service- VMDK Recovery Tool (ESX 3.5 Update 3)
collectd - The system statistics collection daemon
DNSDusty
khtml2png - Make screenshots from webpages
Fundamentals of Ad Networks: Part 4 of 4 | AdNetworkX
Fundamentals of Ad Networks: Part 3 of 4 | AdNetworkX
Fundamentals of Ad Networks: Part 2 of 4 | AdNetworkX
FUNDAMENTALS OF AD NETWORKS: PART 1 of 4 | AdNetworkX
Top 20 OpenSSH Server Best Security Practices
DNSCAP - DNS traffic capture utility | DNS-OARC
Computer hardware poster 1.7 by *Sonic840 on deviantART
body.tex - Less known Solaris Features - wikis.sun.com
Microsoft SMB Community Blog : Microsoft Word 2007 Training Roadmap
egosoft.com :: View topic - [SCR/MOD] Complex Cleaner v3.20 / Modular Complexes
egosoft.com :: View topic - [Script] A.R.E.S. Station Building Service [ V 0.33 ...
egosoft.com :: View topic - DodaFu"s Universal Complex Tool [V 3.42 Beta][4/1/20...
60+ Absolutely Stunning Space and Planets Wallpapers | Wallpapers
The Simple Dollar
Storynory: Free Audio Stories for Kids
Musopen - Free Public Domain Classical Music
Two ways to upgrade the agents in Migrating to NS7 | Symantec Connect
AT&T Reuse & Recycle | Wireless from AT&T, formerly Cingular
BleachBit: Free much more disk space than localepurge
Open source data quality, data profiling and master data management | DataCleane...
Web-Absence
NASA Ames Open Source Software | Home
Peabody Institute - Ensembles: PCO Concert Recordings
Minnesota Public Radio
WebHome < PERTKB < TWiki
Monitoring
Taskwarrior - Overview - Taskwarrior
Home - www.trust-factory.com
Windows Server
Jim Boyce - Tips and Tricks for Windows, Office, Outlook, software, and hardware
Z-Push - open source push technology
IEEE Spectrum Online: Technology, Engineering, and Science News
Anagran: Total Bandwidth Management | www.anagran.com
Cold cloning without the Enterprise VMware Converter Boot ISO | Ardamis
PlanetVM
sanbarrow.com
Jase’s Place
10 things you should cover in your social networking policy | 10 Things | TechRe...
Bkis Blog » Korea and US DDoS attacks: The attacking source located in United Ki...
Memory Behavior when VM Limits are Set
Daily Hypervisor - Your Daily Dose of Virtualization
Essential Etiquette Advice and Information for Worldwide Travel at Travel Etique...
Workflow SWAT Site - Home
TidBITS Safe Computing: iPhone 3GS Offers Enterprise-Class Security for Everyone
KON-BOOT - ULTIMATE WINDOWS/LINUX HACKING UTILITY :-)
PEPPM Multi-State Bid
gnomeDIAicons - Beauty icons on your diagrams
New network icons schema to Gnome Dia « thiagoribeiro
Electricity Around the World
JStock - Free Stock Market Software. Fun. Easy. Simple.
Build a Wi-Fi radio relay using household materials - The H: Security news and O...
Shinobu: Index
Tokyo Made Simple | TokyoTopia | Your Insider Travel Guide
TidBITS Tech News: Double Plus Ungoods: Amazon Unpublishes Orwell
Carpe Datum : SQL Server Licensing De-Mystified (Sort Of)
SharePoint Development Tools - SharePoint Development Wiki - SharePoint Dev Wiki
SciScope
Microsoft Windows SDK Blog : New Win32 Samples in Windows SDK for Windows 7: Win...
ProcDump
PM Skills for Life - Sources of Insight
Nav developer"s blog : Index Usage Information Tool
Canadian Developer Connection : DimeCast.Net’s SOLID Screencasts
Nick MacKechnie : Infrastructure Planning and Design Guides for Windows Server 2...
SQL Server Premier Field Engineer Blog : SQL High CPU scenario troubleshooting u...
Master-PowerShell | With Dr. Tobias Weltner - PowerShell.com
Seth"s Blog: How to make graphs that work
inSSIDer | MetaGeek
Vistumbler.net - Home
NetStumbler.com
TheUserManualSite.com - We found it so you don"t have to!
TSP Solver for Google Maps
EasyGPS - FREE GPS Software for your Garmin, Magellan, or Lowrance GPS
GPS Visualizer
Mike"s Online Ahriman"s Prophecy Strategy Guide
Ride with GPS
Multiplottr.com -- Plot, save and share multiple locations on your own customize...
idealroute.com
International Free and Open Source Software Law Review
VMware vLaunchPad
DIVFIX.MAXELINE.COM - Offical DivFix homepage - divx, avi, video, movie repair, ...
Welcome to vSphere-land!
Adobe PDF Tips Tricks
WikiCrawler - Discover Unmanaged Information Silos
Connecting Geometrica: ISO 9001 Certification With a Wiki
Using a Wiki to Implement a QMS
Stop Spam
Visual Economics - Financial Infographics & More
Home
Windows Update Codes
wsuswiki [WSUSWiki]
Some file types are blocked - Gmail Help
As a security measure to prevent potential viruses, Gmail doesn"t allow you to send or receive executable files (such as files ending in .exe) that could contain damaging executable code.
WiredSafety: the world"s largest Internet safety, help and education resource.
Twitpic - Share photos on Twitter
100 Essential Skills for Geeks | GeekDad | Wired.com
More Nagios, More DAOS - By Ulrich Krause - eknori.de
Nagios, Centreon and DAOS - By Ulrich Krause - eknori.de
Local Harvest / Farmers Markets / Family Farms / CSA / Organic Food
Microsoft Dynamics CRM Team Blog : Rolling with the System Administrator Role
Microsoft Office Project 2007 : Back to Basics: Let"s talk about the critical pa...
Parag"s Weblog : Troubleshooting Web Application Performance
Four Fixes to Common Problems Running iTunes for Windows XP
EricLaw"s IEInternals : Notes on Proxy AutoConfiguration Scripts
7 Excellent Open Courseware Collections for Digital Photographers
U3 Incident Response Switchblade - Hak5
Deleted Domain Names
Fanurio - Time tracking software for freelancers
Summary Of Usenet Links
Cost of living: Compare prices in two cities - CNNMoney.com
Ajaxonomy del.icio.us Spy
Paresh Gandhi"s Blog : Useful links for Microsoft WSS 2.0, 3.0, Search Server 20...
Toolshed | Shows | Channel 9
Computing Education Blog
Rakki Muthukumar : IIS7 – Improving ASP.NET performance (concurrent requests) wh...
Ron Grzywacz"s Blog : PAL Thresholds for MOSS Crawling Performance
CSS SQL Server Engineers : Attach of the Clone (… Databases)
SOPERA - Open Source SOA 
xTuple | Open Source ERP for Mac, Linux and Windows
wissel.net :: Minimizing your server downtime when upgrading
Success & Motivation – If(Cash In < Cash Out)= You are a Consultant « blog maver...
haraldscan - Google Code
PNP4Nagios
SchoolTool: free gradebook, attendance, calendars and more. — The SchoolTool Pro...
Unknown Horizons - Welcome to Unknown Horizons
Join The Revolution! » Sign your Code
KNOVA Software - Knowledge Management for the contact center, web self-service, ...
iorg.com - business aligned web sites - practical workshops and audits
calibre
Thrive For Developers
Cindy Gross - Troubleshooting, tips, and general advice about SQL Server : x64 W...
DNS-BH - Malware Domain Blocklist
BigAdmin Submitted Tech Tip: Setting Up and Debugging SSH Authorized Keys
Basic Parsing (mar 95)
who | perl -ne "@F = split; print "$F[0]\n";"
nexsm
http://www.oneunified.net/files/Defaults.cisco.oneunified
Maxime Bombardier - SharePoint Architecture & Development : Experiences on using...
Performous
Microsoft Hohm
Microsoft UK Schools News Blog : Microsoft licensing for schools – a new option ...
Download details: File Server Migration Toolkit
Bright Side of Government
Asterisk Flash Operator Panel 2
http://www.diyonline.com/servlet/GIB_Base/bobvilabegin?projectName=2714900&first...
Talking to a Wiimote in Ubuntu 8.10
Use a Wii Balance Board with Linux
How To Write A Resume: 12 Steps To Your Next Job | Wise Bread
Nutrition Toolbox | Principal Health News
Thinking problem management!: ATM overview
kotekzot - X-resource
Jackbeat – Trac
OSOR.eu - Open Source Observatory and Repository — Open Source Observatory
IDABC.OSOR.casestudy.LiMux.pdf (application/pdf Object)
Ksplice: Rebootless software updates
Miro HD Video Player | Free internet tv and video podcast player.
Real-Time SQL Monitoring in SQL Developer - Doug"s Oracle Blog
the ultimate team organization software
clearBudget - online personal budget management
Emsco 40 Gal. Waterstone Rain Barrel with Gutter Diverter Rain Water Collection ...
Nagios: Notifications to both impress and convey the message to the recipient « ...
Knight-time Ramblings: How to Demote a Long-Disconnected Domain Controller
How to remove data in Active Directory after an unsuccessful domain controller d...
Domain controllers do not demote gracefully when you use the Active Directory In...
Warning! Volume Shadow Copy Service Sometimes Eats Excess Disk Space
ThreatExpert - Automated Threat Analysis
Collaboration and CRM over Email. Simple and Secure: tgethr
Business Collaboration Software| Small business real time collaboration software...
Configure Bacula for Open Source Backups
Gen-X childhood icons go boom, take the Internet with them | Web Apps News - Bet...
Dropbox - Home - Secure backup, sync and sharing made easy.
Running SAP Applications on SQL Server : New SAP on SQL Server 2008 Whitepaper r...
Clustering and High Availability : PowerShell Remoting and the “Double-Hop” Prob...
Carpe Datum : Use PowerShell to Backup All User Databases
Everything Office - Brent Whichel
Master List of Windows 7 Keyboard Shortcut | Windows 7 News
Tech Tip: Determining What"s Been Changed on RPM Based Systems | Linux Journal
David Wang : HOWTO: Diagnose 401.x HTTP errors on IIS
Welcome to Automotive Vehicle Information Number Check. VIN Validator
Teen Growth, the teen resource for advice, health information, social interactio...
How to lose your data | Ask The Admin
WebCite
Cisco IOS hints and tricks: ADSL reference diagram
Cisco IOS hints and tricks: ATM is like a duck
Unusual Hotels of the World : Online Guide of the World"s most Unusual & Unique ...
Airport Parking Discounts - Cheap Airport Parking at About Airport Parking.com
DNS Bajaj - v0.9.6
How Forcing Password Changes Actually Weakens Security at Helge Klein
Copy & Paste Excel to Wiki Converter
bash String Manipulations Issue 18
Available command-line options for Intelligent Updater versions 4 and 5
http://www.geocities.com/SiliconValley/Garage/5238/Download.html
How to automatically create a backup copy of your Domino Directory
GanttProject Home
Tibor Karaszi"s SQL Server pages
Nick MacKechnie : SQL Server 2008
Game Theory : Intro to Audio Programming, Part 1: How Audio Data is Represented
KontrolPack - Control Your Network
Explaining Defense in Depth
Genetic Testing for Health, Disease & Ancestry; DNA test - 23andMe
Ekahau HeatMapper - The Free Wi-Fi Coverage Mapping Site Survey Tool
Headlamp05to08.pdf (application/pdf Object)
...
NEW: Solaris 10 Security Deep Dive Presentation : Glenn Brunette"s Security Webl...
Remote-Exploit.org - Supplying offensive security products to the world
Bad Peggy
Shorpy Photo Archive | History in HD
Data.gov
How To Deal with Spam and Report Email Scams in The U.S.
Network Backup Software | Enterprise Backup Solutions | Arkeia
DIYbio
wissel.net :: Picking your routing and replication architecture
organic fertilizer: retrieving dell warranty data via powershell
Tim Anderson’s ITWriting - Tech writing blog » Fixing a VirtualBox Windows XP bl...
Repair Tool of the Week: Antivirus Removal Tools | Technibble
How to buy data deduplication :: SearchStorage.com.au
WDVL: Python: Breaking Down a Simple Python App
SSH Is Sexy And Fast Pt2 ~ Linux Fanatics
Perl Tidbits: Annoyances and Surprises « UNIX Administratosphere
Facebook Purity - Removes annoying quiz and application messages from your faceb...
TinyURL Decoder for Greasemonkey
Server Fault
nextstop: Discover Things to Do, Local & Travel Guides, Recommendations and Maps...
AlmostMeet - Online meetings for group collaboration - Web Conferencing
Ninja - A Nagios GUI Project
Everyday Systems: Systematic Moderation for sustainable good habits
Top 10 Most Effective Job Search Websites
PITA
Top 10 Free Genealogy Websites to Find Ancestors
JustTechJobs.com - Search for IT, Tech Jobs - IT Careers for Technology Professi...
Configure Cisco Switches for Easy Server Deployments
Lotus Guru :: Career Advice For the Laid-Off Notes Professional
pmooney.net :: Understanding Engineers
wissel.net :: How does the ideal Notes/Domino 8.5 upgrade looks like
iPhone Configuration Utility 2.0 for Mac OS X
vSphere SDK for Perl
Monitoring VMware ESX 3.x and VMware ESXi
Free Portland WiFi - Free wireless internet in Portland on WifiPDX
How to Use Geolocation in Mobile Safari - Map Scripting
CCJobNet.com
Jobs & Employment | Full & Part Time Job Search | SnagAJob.com
ricklibrarian
NextWorth: Home
ipMonitor :: NOTES-MIB: IBM Domino MIB Specification
Fine Points of Configuring a Cluster
Optimizing server performance: Domino clusters (Part 2)
Optimizing server performance: Domino clusters (Part 1)
IBM - Domino Router notes.ini debug parameters for SMTP
Blackberry Key Tips | Domino @ Symetrik Design
Domino @ Symetrik Design
LZ1 compression on 6.5.6 - Does it replicate? | Domino @ Symetrik Design
IBM - Switches to use with the Compact server task
LNToolBox
IBM Lotus Notes
Lotus Domino Administrator 6.5 Help - Completing the Configuration of the Domino...
Lotus Domino Administrator 6.5 Help - Configuring the Domino SNMP Agent for Wind...
Stephen S. Constantine: Lotus Notes / Domino Administrator - Updated Resume
How Do I Download Songs onto iTunes - A Tutorial
 Amazon Kindle Wireless Reading Device...
Office Furniture with A Higher Form of Function :: Bretford
IBM Lotus Domino and Notes Information Center
Starting the Domino server add-in tasks
Fun writing a maintenance script domino ldd lotus notes nsd application openntf ...
Five Things I Do With Every Ubuntu Installation ~ Linux Fanatics
Piwik - Web analytics - Open source
Piwik › Web Analytics Reports
FREE ESXi Monitor download – VMware vSphere monitoring with Veeam Monitor
Virtual Lifestyle
Sonar
Focused crawler - Combine System Homepage
Wolfram
Tiki Wiki+CMS+Groupware Project - Documentation Wiki : Install on Debian
Clinical Data Interchange Standards Consortium (CDISC)
Support policy for Microsoft SQL Server products that are running in a hardware ...
How to obtain the installation source download and license keys for Backup Exec ...
TED: Ideas worth spreading
The Architecture Issue - Data Center Overload - NYTimes.com
Slide 1 of 10
Institute of Physics - Home of the Institute of Physics
Backing up your BES | ukstokes.com
View Document
Leadership By Numbers :: Quick How-To Test Your Backup Blackberry Enterprise Ser...
VM-sickbay
sanbarrow.com
UltraDefrag - An Open Source Defragmenter
A free CD/DVD emulator for Win32 and Win64
Starting & stopping Domino with a batch - Review
Security Policies
Legal Technology - Get Your Free Case Law on the Web
SQL Server Script to Display Job History
How to Roll Clothes - wikiHow
X3 Reunion Active Map
T2P: Truth to Power Association - Information Governance Research Community
Ease The Pain Of eDiscovery - Electronic Discovery - E-Discovery Forum
"If you give an IT person a horrible task to do one time, he"ll complain," D"Agostino says. "Give it to him 10 times, and he"ll find a way to automate it." E-discovery needs can"t be attacked with "manual, fly-by-the-seat-of-your-pants processes," he says.
T2P: Truth to Power Control & Risk Calculator
Download details: Microsoft Product Support Reports
Antimail : Attack of the clones: how to assign a drive letter or directory to a ...
Antimail : A bit of black magic: How to assign drive letters to VSS shadow copie...
rdiff-backup: Main
openmeetings - Google Code
Aluminium - Home
GeekyBoy.com | IT knowledge base of anything Adam Culp thinks he may want to rem...
Backups using rsync
Jitterbit | freshmeat.net
FreeBASIC compiler (a free BASIC compiler) - official page - News [en]
The Insider"s Guide to Domain Transfers
GeekyBoy.com » Blog Archive » Backup Windows Domain Controller using NTBACKUP vi...
Networking: Protecting your network against rogue DHCP servers
Charles Web Debugging Proxy • HTTP Monitor / HTTP Proxy / HTTPS & SSL Proxy / Re...
Switching Local Toll and Long Distance Carriers | UCAN
By dialing 700-555-4141 from a telephone, a recording of the name of the company who is providing long distance service will be played.
Virtualised Reality
unique
PointSMS.org || the easy way...
SSH for BlackBerry
Resetting AirPort Express
ESXi (ESX 3i) Enable SSH
VMware Communities: ghettoVCB.sh - Free alternative for backing up VM"s for ESX(...
VMware ESX and ESXi Scripts & Resources
Google Desktop Enterprise Edition - Admin Guide
Silent Uninstall Cisco VPN by Installshield
Nettica.com | Articles - Setting up Reverse DNS
Script Repository: DNS Server
grocery list or shopping list - Make a printable grocery list and take your shop...
Realeyes Technology: Good Passwords
How to build a highly available file server using OpenSolaris, iSCSI, ZFS and St...
Download details: SyncToy v2.0
The Many Faces of Mike McBride
nxt-web - Google Code
GlusterFS - GlusterDocumentation
QuickrTemplates: Welcome!
LinuxHardware.org - HOW-TO: Configuring Your Mouse To Work With All 5 Buttons
Lojban : Lojban
Robin Powell"s Home Page
FAI - Fully Automatic Installation - Home Page
Robin"s List Of Good Techno
Free State Project Home [ Free State Project - Liberty in Our Lifetime ]
info.tw.o - Welcome to TikiWiki CMS/Groupware : HomePage
Gaming@TeddyBorg : X3: Reunion
Plantronics Voyager PRO Bluetooth Headset Sounds Like a Winner
Product Review: Verizon"s MiFi™2200 Intelligent Mobile Hotspot (Andrew"s Blog 06...
The Cluetrain Manifesto — Entire Text Index Page
Strange Maps
Cisco DHCP Snooping with ISC DHCPd - TreehouseTechnologies
Catalyst 6500 Release 12.2SXF and Rebuilds Software Configuration Guide - Config...
CCNA Security CCNP BCMSN Exam Tutorial DHCP Snooping
Free things to do in New York City- Time Out New York
SourceForge.net: logdigest
Linux Performance Administration by Mark Rais - reallylinux.com      
Irish and Celtic Music Podcast
How to back up and then restore printers when you upgrade from Windows Server 20...
Microsoft, Intel goof up Windows 7"s "XP Mode" - Ars Technica
Information Technology Writer
Free Online Barcode Generator
The Ultimate ‘Upgrade To Windows 7′ Guide
Bing: The Next Big Thing From Microsoft
4DIAC: About
Computer History Museum | Early Apple Business Documents
Home - Mulesource Community - mulesource.org
Leading Geeks: On the Meaning of Leadership
Bing
Legal Technology - A Modest Solution to E-Discovery Problems
Business Software Alliance - All Tools
JTAGTest: Affordable JTAG testing and development solution
Online Backup from Backblaze
FTA Home Page
2009 Callan Periodic Table of Investment Returns » My Money Blog
NOAH - index
Home: ENERGYguide.com - Lower Your Energy Bills
J.D. Meier"s Blog : Lessons Learned in patterns and practices
osCommerce, Open Source Online Shop E-Commerce Solutions
vbAccelerator - Index of Code
Andrea VB Programming - Visual Basic and VB.NET source code site
Visual Basic Code , VB Code , VB.NET Code
Visual Basic Code at vbcode.com
Master Mitch - whatsnewfm
John W Powell : RV-AIR: A Five-Step Process to Troubleshoot and Fix Just About A...
THE FREEDOM NETWORK AUDIO PORTAL - Free & Easy Access to worldwide Broadcasts on...
Chess Rating Calculator - Home
digitalresearchtools / FrontPage
FilesOverMiles: Easily send large files directly between computers for free
[ file ai ] - Securely Share Files Too Big To E-mail For Free
Recap: Creating Your Own Discovery Team : Lawdable
SQL Server Setup : Creating a SQL Server 2008 Management Studio Express Slipstre...
Nivot Ink - PowerShell v2.0 – Differences Between CTP3/Win7Beta and Win7RC
Random Musings of Jeremy Jameson : Add sysadmin in SQL Server 2008 Using Local A...
Amit"s blog : SQL Server and SAP !!!
Christophe Fiessinger"s Blog : Windows 2008 Server Replication and SharePoint Se...
vii"s teepeedee2 at master - GitHub
Realeyes
So really..if all of this is "secret sauce" how come it"s so googlable? - THE OF...
TheVESI.org – Free Software and Virtualization Community
Carpe Datum : The Role of the DBA in the "Cloud"
You need to be seen more as a business data champion than a bits and bytes kind of person.
http://www.mvps.org/winhelp2002/hosts.txt
Hey, Scripting Guy! How Does Windows PowerShell Make It Easier to Work with SQL ...
UCompareHealthCare - Find Information on Doctors, Hospitals and Nursing Homes
Free PowerPoint Templates and Backgrounds
Sourav Dutta"s SharePoint - All Rounder : Updates Resource Center for SharePoint...
Pointy Haired Dilbert: Charting & Excel Tips - Chandoo.org
Carpe Datum : SQL Server Best Practices: Create a Recovery Plan
Download details: Microsoft SharePoint Administration Toolkit v3.0 x86
mszCool"s thoughts and cents revealed : The .NET Client Profile and a List of In...
NASA Spinoff homepage
Index of /dir2cast
Japanese language support on BlackBerry « Horas and konnichiwa untuk semua
FS_scan: Getting Detailed with Your Data | Linux Magazine
Webacula
developerWorks spaces: The GReen IT Report: Energy, efficiency, and the environm...
Engadget Labs: The best mobile data carrier in America
How to turn a photo into a card with GIMP | Red Row Studio
Kicking the Tires on Your Next CMS
Modify xorg.conf for better performance | TuxRadar
SwissDisk - Secure Online Storage
Windows Hack Cleanup
Galaxy Control Systems - Access Control Security System
Hampton Roads .NET Users Group
Tidewater Area Macintosh Users Group
Using and writing Ghostscript testing scripts
Problems with AVG running Vista - Tech Support Guy Forums
Disable annoying Vista UAC popups with TweakUAC (FREE)
Windows Vista Windows Remote Assistance
Live Mesh Beta
Ramnish Singh"s Weblogs.... : Planning for Windows 7
Project Server 2007 Performance Lab Kit - Home
Detecting Packers in Network Streams with Pynids and Pefile | Malware Forge
Apple - Games - Articles - X3: Reunion
check_openmanage | freshmeat.net
EGOSOFT · Support · FAQs · FAQ: Read answer
GradeL: Gradebook for Linux
DRBD:Management Console
MP3 Diags
Towel Day - Celebrating the life and work of Douglas Adams
May 25
Test the strength of your password policy | Security Central - InfoWorld
SharePod - Download
X-resource
Home - SD Association
How to make a Delicious “plugin” for Chrome - Tip. Trick. Mod.
Svchost Process Analyzer - a svchost.exe file checker
10 Powerpoint Tips for Preparing a Professional Presentation
SD Formatter - SD Association
http://lkcl.net/rtmp/RTMPE.txt
Windows Server 2008 R2 - Home
Terry Zink"s Anti-spam Blog : How virus researchers work
Clustering and High Availability : PowerShell for Failover Clustering: Frequentl...
X3 - Reunion: Online Complex Construction Calculator
OutlookStatView - View general statistics of your Outlook mailbox
Planypus - Make plans with your friends
How to Clean Stuff
Is Due On - Freakin" simple bill tracker!
Matrex Home
UGU: Unix Guru Universe - checksplunk
SAIL - Samba Administration Interface for Ldap
Samba Administration Interface for Ldap The easiest way to manage user groups and shares
Jobless and Less: The Blog for the Employmentally Challenged
John"s CRM Blog : What version is installed again? (Part 2)
Subhajit"s Blog : Tip: The untold story of Audit Logs in SharePoint
Trimauditlog: Stsadm operation (Office SharePoint Server)
FedScoop » One Stop for All Your Government Business News
FedScoop is the only independent aggregator of the most trusted and popular online web sites and blogs on the net that Government IT executives go to every day to stay abreast of trends, best practices, business opportunities and news.
I. M. Testy : Better Bug Reports
Windows PowerShell Blog : Processing Event Logs in PowerShell
The Platform and the Hardman : Tangible Savings of Windows 7 vs. Windows XP
Crabby Office Lady : It’s all about the book
CodeJedi.NET : SharePoint Server 2007 SP2 sets expiry date on servers
FSR Sensor tutorial
HVACMonitor: Web-Enabled Thermostat - Marc Daigneault
Gallup-Healthways Well-Being Index
Alpha Consumer - Money & Business (usnews.com)
SourceSec Security Research » Blog Archive » WPScan & WPSpy Tools
Get Rich Slowly » How to Nail an Interview: 20 Job Interview Tips
Find a lawyer. Free legal advice. Lawyer ratings. - Avvo.com
Container gardens: Growing veggies indoors - dealnews.com
How-To: Backup your Windows iTunes library
abuse.ch ZeuS Tracker BETA :: ZeuS Tracker
Home | Marketcetera
agedu: track down wasted disk space
texts from last night
Complete Beginner’s Guide to Information Architecture | UX Booth
Kill Them With Logic: Rant: Lack of applying scientific method to solve problems
NTCore"s Homepage
Download Likewise Open -- Open Source AD-Based Authentication for Linux, Unix, a...
33 Brilliant Business Card Templates - Vectortuts+
Manageability - Open Source ETL (Extraction, Transform, Load) Written in Java
When pet projects bite back!: Open Source ETL tools vs Commerical ETL tools
Open Source Projects SAP BI Customers Should Know About | Rendition X
The case for open source ETL
LightScribe - Downloads - Windows
Athena -- Goddess of Wisdom
op5 Plugins - check mssql, check oracle, check esx
Open Source Monitoring - Icinga
Protecting the router’s control plane - CT3
Security Center - Cisco Systems
Open WebMail Project
AKB 21270: How do I give a security role rights to delete computers
KSimus - Main
Newtech Recycling Secure Computer and Hard Drive Disposal and Recycling
Unison Wiki - Main - HomePage
GGTSdotNET » Blog Archive » Joining a Windows 7 system to a Samba domain
DIASER - Main
SymmetricDS - SymmetricDS
How To Backup Your Twitter Archive
Tweetake: Download your Twitter Data to your PC
Geek Chart - Show Where You Share
Easy2DIY.com: Home Improvement & Home Repair Help
100 open source gems - part 1 | TuxRadar
The Linux and Unix Menagerie: Recovering Lost Data On Linux Or Unix Using The Co...
Record your Skype Calls for Free with Skype Call Recorder | Kabatology ~ Open So...
Juniper Networks - How Do I Configure a 1-to-1 Mapping of a Public Address to a ...
Juniper Networks - FAQ: Can I modify MIP on the fly without deleting the associa...
VMware Communities: Free ESXi Backup Solution for Windows
Downloads - Virtualization Utilities - VMNetBac | PHD Virtual Technologies |
Downloads - Virtualization Utilities - SnapHunter | PHD Virtual Technologies |
Lotus Notes Domino replication primer
Tips on monitoring Domino statistics and events
NEW MATH by Craig Damrauer
Wolfram|Alpha
How to Alter a SQL Server Database as Single User Mode and as Multi User Mode
EXEC sp_dboption "Works", "single user", "true"
Streamlining the Database Server Recovery Process on SQL Server – Database Journ...
Sort Benchmark Home Page
BBC NEWS | Technology | The accelerator of the modern age
Chad Miller"s Blog - Windows Live
Hewlett-Packard Co.
SourceForge.net: DriverBackup!
Project Euler
Jie Li"s GeekWorld : Upgrade Checker in SP2 – prepare your way to SharePoint Ser...
Visual Studio : Install Window7 from USB Key onto netbook – what worked for me
Bob Duffy"s Blobby Blog : Disk Partition Alignment De-Mystified
Blogs from Suhas : Database Corruption Part 3 :: Differences between CHECKTABLE ...
The Visual Basic Team : CodeRush Xpress Released Today! (Lisa Feigenbaum)
40 Most Useful Travel Websites That Can Save You a Fortune | Wise Bread
OBDII Project Home
» The Great GoogleLapse · Security to the Core | Arbor Networks Security
Andrisoft | IP traffic monitoring and network protection solutions
Protect Your PostScript Files from Being Converted to PDF | Linux Journal
X3 Complex Tips
Babylon 5 Mod for X3 Terran Conflict - News
How To Back Up and Restore IIS
Basic Netscreen Commands | SecManager
DESTINATIONNAT.pdf (application/pdf Object)
A Lightweight SQL Database for Cloud and Web in Launchpad
Disk Alignment Partitioning: The Good, the Bad, the OK and the Not So Ugly - Win...
Disk Alignment
sqlprofiler - Profiler for Microsoft SQL Server 2005/2008 Express Edition
Harry Potter"s World Renaissance Science, Magic, and Medicine
organic fertilizer: dns2003discovery.vbs script or executable failed to run
IIS & Exchange Digest
How to Install IIS Unattended | IIS & Exchange Digest
Sysocmgr.exe /i:%windir%\inf\sysoc.inf /u:%PathToUnattendFile%
Windows Search 4 still throttles itself too much - little known XP / Vista / Win...
More PowerShell Basics « Home of the Scary DBA
SearchMyFiles - Alternative to "Search For Files And Folders" module of Windows
rendeznew - the NEW way to "meet in the middle"
Save Money by Rekindling the Art of Reusing your Stuff | Wise Bread
The Lazy Environmentalist
Konami Code Sites
Do you know another "Konami Code powered" website?
Microsoft CRM Support Tools Downloads - Folder Shared from Box.net - Free Online...
Carpe Datum : Who is Active - a replacement for sp_who2
The Way I See It : IIS 7 Tip # 10 You can generate machine keys from the IIS man...
Clinic 10125: What"s New in Windows 7 for Consumers
Clinic 10088: What"s New in Windows 7 for Information Workers
Clinic 10077: What"s New in Windows 7 for IT Professionals
Cleaning up the Mess Left Behind by Multiple EFS Certificates at Helge Klein
Xobni - Outlook Plugin to Search People, Email, and Attachments Instantly
For Admins: Windows Installer Error Codes (Exit Codes) - DesktopEngineer.com
Productive! Magazine about Getting Things Done and Lifehacks. Edited by Michael ...
The Life Pie « gailvazoxlade.com
Checklist: Ten steps to take if your Domino server crashes
Success & Motivation « blog maverick
Whither Sockets? - ACM Queue
Software - TreehouseTechnologies
the [non]billable hour: Ten Rules for Conference Vendors
Jie Li"s GeekWorld : Upgrade Checker in SP2 – Behind the Scene
Pages - livechat - Microsoft Licensing
Windows 7 Upgrade Advisor
SQL Server Central Management System - Home
PowerShell Basics « Home of the Scary DBA
Tim Anderson’s ITWriting - Tech writing blog » Bytemark failure illustrates valu...
What is it good for?
How to enjoy Kyoto for free › Japan Today: Japan News and Discussion
R. Preston McAfee
BaconMap - IT Resource Relationship Mapper
Campsite
ConcourseConnect | freshmeat.net
LibraryThing | Catalog your books online
Upgrade Debian etch to lenny | Racker Hacker
sudo vim /etc/apt/sources.list [change "etch" -> "lenny"] sudo aptitude update sudo aptitude install apt dpkg aptitude sudo aptitude full-upgrade
Batch vs Real Time Processing and the Emerging Web Culture - O"Reilly Broadcast
Mud Rooms, Red Letters, and Real Priorities | 43 Folders
storeBackup.org--Free, super efficient backup software
SourceForge.net Project:
SourceForge.net: javascriptRRD
git.debian.org Git - collab-maint/upgrade-advisor.git/summary
APWG
What happens when your iPhone overheats
Everything You Need to Know About Personal Finance on One Page | Wise Bread
personal-finance-on-one-page.png (PNG Image, 800x1035 pixels) - Scaled (94%)
Advisory Check | freshmeat.net
A must have
JET 4.7 Now available : JET Stream
Puppet « reductive
Hissohathair: nagios
Salary Calculator, Salary Comparison, Salary Negotiation, SalaryScout.com
Windows Core Networking : QoS Traffic Generator Example Usage
The Way I See It : Setting SMTP RelayIpList from a script.
Welcome to The Clubhouse
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
OraNA :: Oracle News Aggregator
One Div Zero: A Brief, Incomplete, and Mostly Wrong History of Programming Langu...
Why Information Must Be Destroyed, Part Two - CSO Online - Security and Risk
IT UCF: Media Disposal
WCPE - Great Classical Music 24 Hours a Day
Oracle 10g instant client – Hard to make it work « The Tendjee
IFilter dot org - IFilters for Microsoft search technologies
Indexing binary files with IFilters on Windows installations / Tips & Tricks / C...
CodeProject: Your free search engine – Microsoft Indexing Server. Free source co...
desktopsearchifilters | Channel 9
Top 100 Reasons to Work with Us | ReThink Rewards
37. IT has their own mascot - a large stuffed donkey
[SOLVED] Samba log file - Ubuntu Forums
printcap name = /dev/null load printers = no printing = bsd
Woodworking
How Michael Osinski Helped Build the Bomb That Blew Up Wall Street -- New York M...
XMPP Standards Foundation
http://www.lasermonksgreen.com/
Business Card Star - Design business cards for free at Businesscardstar
Cesar de la Torre - BLOG : How to install a Loopback Adapter in Windows 7
14 Tips for Purchasing Life Insurance ∞ Get Rich Slowly
An Introduction to Life Insurance ∞ Get Rich Slowly
Welcome to POA
Index Service Scripts
Windows PowerShell Blog : PowerShell V2 - backward compatibility
How to Find and List Unsigned Executable Files at Helge Klein
Official home of X3: Sector Planner by LordSuch
Ask The Admin » Blog Archive » Group Policy: Desktop Lockdown Part 1
Qipit - Copy and share documents
Tim Anderson’s ITWriting - Tech writing blog » Windows 7: why you should keep Us...
Engineering Windows 7 : Support and Q&A for Solid-State Drives
AsiaTech: Learning by Practice : Why my account is getting locked out every one ...
Windows 7 Training Resources - Canada : New Training Resources on Windows 7
Windows PowerShell Blog : PowerShellToys – WOW!
Active Directory Powershell Blog : HOW TO CREATE A FUNCTION TO VALIDATE THE EXIS...
Active Directory Powershell Blog : ACTIVE DIRECTORY POWERSHELL TO MANAGE SITES –...
Microsoft Bob : SQL Data Warehousing Tips 1 - Building a Period table
Mohd Abubakr"s take on Web Application Performance : SQL Server Blocked Process ...
SQLUnit Project Home Page
How can I mass configure an AP9617 or AP9617 embedded APC-MGE product?
ftp://ftp.apcc.com/apc/public/hardware/nmcard/firmware/
UPS Selector Sizing Applications
get-flash-videos - Google Code
Ignite Realtime: Openfire Server
check_openmanage
skulker2 - Google Code
BizAgi, Business Process Management Software, BPM Software, BPM Suite, BPM
Jack Dorsey on the Twitter ecosystem, journalism and how to reduce reply spam. P...
Twitter creator Jack Dorsey illuminates the site"s founding document. Part I | T...
Mortgage - Refinance Mortgage, Home Equity Loans, Mortgage Loan, Mortgage
Nanda Lella"s WebLog : Windows 7 logo key - Keyboard Shortcuts
All the Groovey news that fits : Jason Campoli on Groove Relay Server performanc...
Green Paws
The Smart Set
Paul Cornell : Kanban: More Kanban Resources
James Shore: Kanban Systems
Corporate Coder
Lean Software Engineering
A Kanban System for Sustaining Engineering
Kanban Process Template for Team Foundation Server - Home
Pipeline
Constant Change » Naked Planning Explained - Kanban in the Small
Kanban in Action
Vijay"s Blog Space : Windows PowerShell and .NET Together (creating the object)
Matthew van Eerde"s web log : Second cousins, cousins once removed; relationship...
Inside Office Online blog : Top 10 Office podcasts (plus 90 more)
100 things you should have learned from Crabby by now - Help and How-to - Micros...
This is one of those that has everything,
There are some that call me...Tim : Powershell: Enumerating a LDAP Group with a ...
Team Individualism : Compendium of Windows 7 Search Connectors
The blog of Rob Margel - Windows Help : Top 10 reasons why you should upgrade to...
Team Individualism : MED-V compared to Windows XP Mode
Canadian Developer Connection : Joel Spolsky: Learning from StackOverflow.com
Windows PowerShell Blog : SE07 Automating Your Infrastructure with Windows Power...
Carpe Datum : And the Winner is - Get SQL Server Error Messages from PowerShell
Microsoft Management Summit 2009 Keynote Demo | Media | TechNet Edge
Download details: Microsoft Dynamics AX 2009 Upgrade Guide
Nicholas Allen"s Indigo Blog : Levels of Tracing, Part 1
Shawn Cicoria : Making a Win7 Bootable USB device.
Microsoft confirms final Windows 7 system requirements
Carpe Datum : Exam 70-432 TS: Microsoft SQL Server 2008, Implementation and Main...
Learn IIS7 : The Official Microsoft IIS Site
Chris Johnson : How we demo…
Microsoft Case Studies
LayerOne 2009
Lockpicking Forensics - Forensic & Investigative Locksmithing, Lockpicking, and ...
Project Kenai — We"re More Than Just a Forge
ZFS Encrypted Backup to S3: Wiki: Home — Project Kenai
Mathias Kettner
Man infects pigs with swine flu on farm in Canada - Times Online
Informal poll suggests nearly 70% of Kindle owners are over 40
Winsted Corporation
Research that will change your life! | CRS
SANS Technology Institute: Pandemic Watch April 2009
GMABooster :: Home
Cricket Liu"s DNS Advisor Pro Tool - Developed by Industry Authority Cricket Liu...
not free but there is a light version
FreeGIS.org
Lessons Learned
SourceForge.net: HashCatalog - Project Web Hosting - Open Source Software
Inside Redbox | Redbox Codes, Redbox News, DVD Rental News, Free DVD Rentals
Making Word documents really read-only - TechForum - TechSpace - Express Compute...
CDC - Influenza (Flu) | Swine Influenza (Flu)
Travelers" Health | CDC
WHO | Swine influenza
Macsimum News - ‘The Twitter Book’ by Tim O’Reilly & Sarah Milstein
Walker of Worlds
jernstrom.org
Video Tutorial: Installation Options for the HP Universal Print Driver and Basic...
HP Universal Print Driver - thoughts? - Topic Powered by Eve For Enterprise
Support & Drivers Search Results | Product: bizhub C353
Xerox Mobile Express Driver: Free Universal Printer Driver
Windows 7 – Learning Portal
My Top 5 SQL Server Indexing Best Practices | SQLServerPedia
For your SAP MM, SAP SD & SAP PP Tips & Tricks
SAP ABAP tutorials, softwares, articles downloads, SAP Jobs, Netweaver, BAPI
SAP Expert
Touchlite for Touch 2 (Metallic Series) [ AP06-007 ]
HackMii — Notes from inside your Wii
The Making Of: PlayStation | Edge Online
Sendpepper
SQL Server Setup : SQL Server 2008 Slipstream Frequently Asked Questions
The blog of Rob Margel - Windows Help : 20 Ways Vista can Improve Your Life
Programming tidbits: store & retrieve : Fix Corrupted Performance Counters
LODCTR /R
Motley Queüe : MSMQ and the Active Directory Recycle Bin
The MossyBlog Times. : Do’s and Don’ts of Video Tutorials.
Engineering Windows 7 : Engineering Windows 7 Graphics Performance
Troubleshooting SharePoint! : PowerShell script to remove all users from a Share...
Hayden Carruth - Poets.org - Poetry, Poems, Bios & More
SpaceSniffer
HackerStorm Report tool for Nessus and OpenVAS
IT & Internet Security, Hacking and Vulnerability Research, Penetration Testing,...
NatWest - Rapport - For safer banking
Network SLAs - Which one to use? - Terry"s Blog
Free Training Content - Legal Holds « LitSupport Trainer’s Blog
Tim Anderson’s ITWriting - Tech writing blog » New in Windows 7 RC: Windows XP M...
TidBITS Tech News: Windows 7 Adds Virtualized XP as Option
gumnut - decentralised organisational software
Get Great Gadgets. And Keep Them. - Last Year"s Model
Network UPS Tools: APC"s smart protocol
Power Line Problems -- An Introduction
Windows PowerShell Blog : V2 Quick Tip: Monitoring Performance Counters with Pow...
CSS SQL Server Engineers : SQL Server and the Bad CPU
Action plans and problem solving : How to optimize the Memory configuration of S...
MSDN Utopia : Best articles from MSDN flash on an ebook format.
Software for Students : The 10/20/30 Rule of PowerPoint
SQL Server Express WebLog : Troubleshooting the corrupt file error when using th...
Microsoft SMB Community Blog : Windows 7 Resources For You
S + S Reality Check : 1+1 Redundancy Just Isn"t Good Enough
The Programmer’s Guide to Getting Hired: Your resume. It’s the little things tha...
Netomata Config Generator (NCG) | Netomata
Free Personal Budget, Online Money Management, Personal Finance Software, Financ...
Watch Free Documentaries - SnagFilms
The History of Credit & Debt
Main Page - Nagios-Portal
10 Ways to Use LinkedIn Effectively
OutWit technologies
TweetDeck: a simple and fast way to experience Twitter
wissel.net :: Building a high performance Domino Server
Yasca - Yet Another Source Code Analyzer
edrm.jpg (JPEG Image, 647x324 pixels)
VMware Communities: Disk alignment on Windows system disk
VMware Communities: old favorite, ESX disk alignment
Disk Alignment « GOING VIRTUAL
VMware Disk Alignment - Welcome to TCPDump!
VMware: Partition/disk aligned or not? « ICT-Freak.nl
The Learning Continuum Company, distance learning training courses for Notes, Do...
Wiring and Cabling: How To Lace Cable Harnesses
JB"s Windows Vista FAQ, Tips, Tricks, and Downloads
Wrok & Joy space: Domino router
The blog of Rob Margel : Power Management in Windows 7 White Paper now available
Aaron Stebner"s WebLog : Mailbag: Do I need still need older versions of the .NE...
Visio Guy » Eight Places to Watch Visio Videos
Brian Jones: Office Extensibility : Removing Comments from Excel and PowerPoint ...
Geekgirl"s Plain-English computer tutorials
Engineering Windows 7 : Delivering a quality upgrade experience
Mark Brown"s Blog : How to recycle a IIS6 website in Windows Server 2003 SP1
PVE POP3 Collector
Computer Science Teacher - Thoughts and Information from Alfred Thompson : Windo...
Untangled
Home: Think Apartments
Oracle Instant Client
SQL Server Setup : Create a merged (slipstream) drop containing SQL Server 2008,...
Windows 7 tips, tricks and tweaks
Debugging Toolbox : [PowerShell Script] PowerDbg v5.2—Using PowerShell to Contro...
Nice things inside SQL Server : How to un install SQL Server 2005
Dave does Data : SQL Server 2008 Jumpstart Materials – very detailed training, n...
Microsoft’s Citizen Safety Architecture Helps Governments Improve Public Safety ...
COFEE
FAQ: Computer Online Forensic Evidence Extractor (COFEE)
Random Thoughts on Technology : Using DelegConfig tool for troubleshooting Kerbe...
Simon Ince"s Blog : Types of Auditing
Varun Dhawan"s Blog : How To: Improve SQL Server 2005 Management Studio Start-up...
agazzeri"s Blog : SharePoint Server 2007 – 10 suggestions for a reliable, low-la...
Erwin van der Valk"s blog: Practicing patterns : sharepoint guidance v2 – drop 7
Microsoft and Oracle Applications and Technology Platform : SQL Server 2008 for ...
Internals Viewer for SQL Server - Home
Another day in the Office : Bending the Ribbon to your will…
Another day in the Office : The Myth of Simplicity
Microsoft SQL Server troubleshooting : SQL Server Resource IsAlive Troubleshooti...
Microsoft SQL Server troubleshooting : Exclusive Session – SQL Server Performanc...
A Visual Guide To Twitter
Install and Configure SQL Server 2008 Express | Symantec Connect
Windows 7 home
The Change Analysis Diagnostic tool for Windows XP is available
Windows 7 2008 2003 XP Vista 2000 Ms Office Tutorials How tos tips and tricks
Windows 7 Forums
SharePoint Knowledge Base
Calendar Time Zone Settings, and My Regional Settings « SharePoint Knowledge Bas...
Amit"s blog : Disk Partitioning Offset
Disk performance may be slower than expected when you use multiple disks in Wind...
SQL Server Best Practices Article
The Best File Backup Scheme
Michael"s Backup Script
Main Page - SecurityForest
xfocus official website
Cross compiling Windows applications under GNU/Linux
Amit"s blog : SQL 2008 Whitepapers
Sanjay Narang"s thoughts on SharePoint : SharePoint (Performance, Stress ) Load ...
Windows Genuine Advantage : The Surprising Risks of Counterfeit Software in Busi...
Dynamics CBM : TFS upgrade from SQL Server 2005 to SQL Server 2008
Ram"s Blog : Sharepoint considerations when configuring AD rights management clu...
Out Of The Box : Windows 7 Features by Version
Dan"s Blog : PCI Compliance and SQL Server 2008
Behind the scenes with Windows 7 › Japan Today: Japan News and Discussion
Yabusame › Japan Today: Japan News and Discussion
50 Ways To Squeeze Value From Your Healthcare Dollar Without Killing Yourself | ...
Life expectancy
DAG: WiiPresent: Giving presentations with your wiimote
Abby"s Closet - Helping Prom Dreams Come True!
SourceForge.net: Advanced Command-line CD ripper/encoder: Advanced Command-line ...
Notes Design Blog
Data storage: RAID, SAN, NAS, Archive and Disaster Recovery by Rorke Data
Windows PowerShell Blog : Differences between the ISE and PowerShell console
Watcher: open source Web security testing tool and PCI compliance auditing tool ...
Viruslist.com - Analyst"s Diary
HDMI
HDMI :: News & Events
Viewing a thread - WSUS Superseded Update Finder Utility 0.1
Digital Photography - RawWorkflow.com - Michael Tapes: photo news and commentary
Don"t Be Afraid Of Customers
The PowerPoint FAQ
Searching, Downloading, and Installing Updates (Windows)
Bristol University | Information Services | Configuring the WSUS Client by Group...
NEbraskaCERT
fsc2 Overview
Giz Village: Concurrent Booting: make full use of your dual-core, multithreaded ...
You can learn a lot about Japanese culture from kindergarten classes › Japan Tod...
Inside Office Online blog : What’s YOUR story? Impress your interviewers with a ...
Scott Hanselman"s Computer Zen - 11 Top Tips for a Successful Technical Presenta...
I know the answer (it"s 42) : Technical Presentation Tip
Canberra PFE : Adding a 2008 Domain controller to your 2003 forest
Bill Ramos on SQL Server : Transact-SQL Debugger for SQL Server 2008 – Part 2
Bill Ramos on SQL Server : Transact-SQL Debugger for SQL Server 2008 – Part 1
Karthick PK "s Blog : Different Status bits of sysdatabases in SQLServer
Bill Ramos on SQL Server : SQL Server Management Studio Tips – Part 4
Josh Gaffey"s Blog : Why cheap developers will cost you
Bill Ramos on SQL Server : SQL Server Management Studio Tips – Part 1
Kirill Osenkov : Remote Desktop: /span across multiple monitors
Esoteric : Rolling upgrade of 1 instance from 2-node, 2-instance sql failover cl...
Karthick PK "s Blog : How to add an IP Address when we Add new NIC to node where...
XMind - Social Brainstorming and Mind Mapping
AT&T Fiber cuts remind us: Location is a Basket too! - O"Reilly Radar
Remember: Don"t put all your eggs in one basket... and Location is a basket too!
McAfee KnowledgeBase - How to use the WinTech CD to remove the encryption and bo...
Full Disk Encryption (Safeboot) - UBCD4Win Forums
SourceForge.net: nVentory
Ask the Directory Services Team : DS Restore Mode Password Maintenance
Matousec - Transparent security: Security software testing, analyses, research a...
Jeet Blog - Internet Marketing, Blogging and New Media
MAKE: Blog: 1000+ Fluorescent lights powered by overhead cables
Cheap Food, Inexpensive Restaurants, New York
Cheap Eats - Ueatcheap.com
Dealfeed – full coverage on Eater
3 Buck Bites | Cheap Eats for Food Lovers!
Grubgirl. | San Francisco Bay Area cheap eats, restaurant reviews, and cooking t...
How Sudden Failures Happen Gradually - Susan Cramm - HarvardBusiness.org
"clean up as you go" aproach
Apricot Mapping Service HQ
Six Steps to Securing an IT Interview
KeyRingThing Cards
Blogs from Suhas : Introduction to Database Corruption in SQL Server
CSS SQL Server Engineers : The 3 Things you Need to Know to Install SQL 2005 on ...
Dgoldman"s WebLog : Full OAB downloads caused by mis-configured anti virus softw...
Microsoft Software Inventory Analyzer
Canadian Developer Connection : Windows 7 Feels the Love
Argonopedia Version 5 - X²: The Threat
accueil [Projet Vigilo]
Family Portraits Do’s and Don’ts
Backup SQL Server Databases
Shape Collage - Download
Free DotNet VersionCheck Utility - TMG Development Ltd
MinGW cross compiling environment
msgoodies: PowerShell, Getting the Value Out of a ScriptBlock
Sharepoint – farm build procedure @ J. Greg’s Brain Corral
WMI_Utility.exe: WMI Search Utility | Symantec Connect
10 Essential Cheat Sheets To Download | MakeUseOf.com
Directory of files/dougj/esx/custominv_esxupdates
Debian Admin--Debian/Ubuntu Linux System Administration Tutorials,Howtos,Tips
HP Universal Print Driver
Universal Print Driver for Ricoh Products
LepoLand - A Blog by Alan Lepofsky - Alan"s blog about software, technology, tra...
LepoLand - A Blog by Alan Lepofsky - Alan"s blog about software, technology, tra...
» DNS Attack Surface · Security to the Core | Arbor Networks Security
How to check the status of VMware Tools per virtual Machine the easy way.
Action plans and problem solving : How to move the WSUS database to a different ...
Action plans and problem solving : How to troubleshoot the “Loading Grid” Projec...
The Deployment guy : Restoring IIS7 Configuration snapshots
Download details: IT Pro poster stencils
List of keyboard shortcuts for Word 2002, Word 2003, and Word 2007
l2admin - One Sys Admins tips, tricks and views on the world.
PXE Magic: Flexible Network Booting with Menus
Conficker Work Group - Main - HomePage
Conficker Eye Chart
VMware ESX SDK SnapShot Perl Script Part 3
Laser Printing Problems using Microsoft Windows Vista - The HP LaserJet blog by ...
Couldnt get a USB HP1200 to be properly recognized by Windows 7 Beta. Universal Print Driver seems to have worked as expected.
Fire Fish
egosoft.com :: View topic - **X3 Player Guides,Tutorials and other Useful Inform...
Money Matters from the Federal Trade Commission
Tim Anderson’s ITWriting - Tech writing blog » Intel network driver 64-bit annoy...
Microsoft SQL Server 2008 Editions
eCycling | Common Wastes & Materials | US EPA
Welcome to InfraGard Awareness
OnGuard Online
Mean Time to Innocence - Terry"s Blog
Mean Time To Innocence
Reflections on Microsoft Dynamics AX : Setting the Max Memory on SQL.
setting the SQL Max memory
Developer hearted / Relational minded : Checking Failover after setting up a Dat...
RecycleBank :: Home
Category Archive for ‘ProfileNurse’ at sepago Community Tools
GPOGUY.COM -- The Definitive Group Policy Resource Site on the Web!
SharePoint Designer Home Page - Microsoft Office Online
Rob"s SQL Server Blog : Performance Dashboard Reports for SQL Server 2008
Phone bill audits, Reduce telecom expenses, Cell phone services reviews
RaProducts - JavaRa documentation
Plangarden Vegetable Garden Plan - Design Software
PXE: Not Just for Server Networks Anymore!
Visual Literacy: An E-Learning Tutorial on Visualization for Communication, Engi...
The Official Blog of Claudia Christian
The Babylon Podcast
ReadWriteThink
smallblueprinter.com :: home of smallblueprinter and garden planner
Bathroom fan FAQ
Action plans and problem solving : SQL Server - Memory Trimming
- Cannot use Large Page Extensions: lock memory privilege was not granted. - A significant part of sql server process memory has been paged out. This may result in a performance degradation.
Evil Genius in Training : Dell Mini 9 NetBook and Windows 7 – Very Cool!
"Obscurum per Obscurius" : Testing Domain Controller Connectivity Using PORTQRY
Virus scanning recommendations for computers that are running Windows Server 200...
Action plans and problem solving : You have just installed SQL Server 2008. So n...
Money Matters NJ
Internet Infomation Services (IIS) : Kerberos SPN Viewer and Helper Tool
Terry Zink"s Anti-spam Blog : What time of the day is worst for spam complaints?
Djigzo Open Source Email Encryption
Dropbox - Home - Secure backup, sync and sharing made easy.
Ask The Admin » Blog Archive » April 1st is coming beware of the Cornflicker wor...
DHS: DHS Releases Conficker/Downadup Computer Worm Detection Tool
Tools, Tools, Tools : DoxPara Research
Informatik IV: Containing Conficker
Cisco VPN Client: Reason 412 - The remote peer is no longer responding | L.A.M.N...
EugeneZ blog : TFS Administrator chores – dealing with the space offender
JExplorer Website Powered by Woo Sik Jung
Glassy Eyes | Deals on Online Eyeglasses. Good eyeglasses. Cheap.
WFMU-FM 91.1/Jersey City, NJ; 90.1/Hudson Valley, NY
SoftHSM – OpenDNSSEC
* TankCalc
RightWebPage - Web Conformance Tool
Observer : Network Management And Monitoring | Main / HomePage
Install Altiris Agent on ESX | Symantec Connect
Nolo: Law Books, Legal Forms and Legal Software
The blog of Rob Margel : 30 New IE8 help articles
Adventures in IIS, Commerce and whatever else comes into my head. : Silverlight ...
Paul Cornell : Autofocus: Adapting Outlook from GTD
Springboard from mortarboard to onboard : Installing Win7 from USB onto Netbook ...
InnovateOn
Terry Zink"s Anti-spam Blog : When do spam outbreaks occur?
Active Directory Powershell Blog : Active Directory Administrative Center for Wi...
ediscovery - Google Code
Schweizer IT Professional und TechNet Blog : Free Windows PowerShell workbook: s...
Effective Windows PowerShell: The Free eBook - Windows Live
Performance Tuning Guidelines for Windows Server 2008
Hacking The Router Patching Conundrum - DarkReading
Backstage at MED : Mobile Forensic Equipment & Software
Tim Sneath : Extending Your Brand to the Desktop with Windows 7
AsiaTech: Learning by Practice : How does client communicate with MSDTC Cluster?
SQL Server Security : Enforce Windows Password Policy on SQL Server Logins
Nota Bene: The OneNote Blog : Lost your job? Let OneNote and Office help!
Carpe Datum : The Effect of Hardware on SQL Server Performance
Fiddler Web Debugger - A free web debugging tool
Carpe Datum : SQL Server Security Links
Random Musings of Jeremy Jameson : Script to Restart SharePoint Services
Running SAP Applications on SQL Server : Measuring Memory Consumption of SAP App...
Macsimum News - Server room setup on a budget: a do-it-yourself guide
CallCatalog.com - Free Reverse Phone Directory - 866 Numbers - reverse phone loo...
BrightScope | 401k Plan Ratings
That’s when I reach for my revolver… « Dan Williams’ blog
Interesting descriptions of the Hardware - Go Dan.
IM3D.net
IM3D.net » Blog Archive » Basis T-Code
OBD GPS Logger
Varun Dhawan"s Blog : How to: Verify path for SQL Server Error Log Files
Kerberos : Kerberos SPN Viewer and Helper Tool
Main Page - CT3
Tech Tips, Comments and Curious Stuff : The way of the whiteboard
SQL Server 2000 Administration in 15 Minutes a Week – Database Journal
Bibliotheca Alexandrina, Front Page
enStratus - Web-based Cloud Infrastructure Management Tools
TalkShoe - Call - ESIBytes - Electronic Discovery Tips
PuTTY Connection Manager
Racketware.info | AFUL
Debian on the SheevaPlug
Microsoft SQL Server Tips & Tricks : SQL Server 2008 Setup fails to Install with...
Ian Palangio"s Business Productivity : Free Screen-cast Video Demonstrations and...
Active Directory Powershell Blog
bert’s blog » Blog Archive » USB sniffing on linux
bluCTRL wireless Bluetooth keyboard and mouse
Heath Stewart"s Blog : How to Safely Delete Orphaned Patches
Co-op America"s National Green Pages: Green Your Spring Cleaning
Marketplace | Spring Cleaning
Cleaning 101
The SSD Project | EFF Surveillance Self-Defense Project
Welcome to Windows 7
» Repair Tool of the Week: Mail PassView - Technibble - A Resource for Computer ...
DomainKeys Identified Mail (DKIM)
Opportunistic Locking | smb, cifs, oplocks, exclusive, batch, level, wafs, cachi...
HOB Techtalk : 3270 - A Brief History
The Crystal Reports® Underground
Language - Kids Web Japan - Web Japan
AsiaTech: Learning by Practice : How to manage my Windows user password through ...
Microsoft | Oracle On Windows Resource Center
One Louder : Saint Patricks Day Haiku
The SQL Server 2008 builds that were released after SQL Server 2008 was released
From Mind To Words : Manually migrating websites from IIS 5.0 to IIS 6.0
Office At Work : Going Green with Office
US ISV Developer Evangelism Team : Windows Version 6.1?
CSS SQL Server Engineers : How to fix your SQL Server 2008 Setup before you run ...
WikiScanner2 - More powerful than you can possibly imagine
Index page – 68k Macintosh Liberation Army Forums
Eucalyptus
IPAudit - Home
Coova.org
Building GTK apps for MS Windows on Linux
Action plans and problem solving : How to use compressed backups in SQL Server 2...
Cisco Validated Designs : Interactive Design Guide
Information Security
Clustering and High Availability : Network Load Balancing (NLB) and Virtual Mach...
The Way I See It : IIS 7 Tip # 4 Application Pool Recycling Events has an UI
Carpe Datum : Finding SQL Servers with PowerShell, Part Deux
Upgrading to Windows 7: what XP and Vista users need to know - Ars Technica
Backing Up and Restoring Databases in SQL Server
Deepak Mittal : .NET framework 3.5 SP1 installation failure with Error 1603
Kirk Evans Blog : Free SharePoint Developer Training
Useful IIS/ASP.NET Information provided by Microsoft Support Teams : Caution whi...
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
contxts - mobile sms business cards
Terminal Services Team Blog : Top 10 RDP Protocol Misconceptions – Part 2
The Way I See It : IIS 7 Tip # 5 Run a command when Rapid Fail Protection is tri...
Windows Management Infrastructure Blog : Let’s troubleshoot WMI (Part 1: Remotin...
Everyone wants SharePoint... : WSS 3.0 Valuable Links.
Developing for Dynamics GP : Great Plains Historical Timeline
Microsoft Excel : Excel VBA Performance Coding Best Practices
Windows PowerShell Blog : dir –a:d
Just Vocabulary - The 2 words a show ESL Podcast
Jon Gallant"s Blog : How to copy tables from one Access database to another
Ashton Office Blog : How to deploy a customized normal.dotm with Office 2007
Janani"s WebLog : Having mobile broadband issues in Windows 7?...
Shiloh , Yukon and Beyond!!! : WMI Basics & Troubleshooting with WMI…
In search of simplicity, quality and tranquility in software engineering : SDLC ...
Aaron Stebner"s WebLog : Steps I use to narrow down an OS update installation fa...
The Microsoft MVP Award Program Blog : Scottish MVP Demystifies IIS 7.0 for ASP....
http://www.blueskills.net/
SAP Help shows only empty sections or blank pages
blindhog.net
iteraplan - Enterprise Architecture Management (EAM) Made Easy | iteraplan Open ...
Network Security for Business Mobility: Napera
Official Website of the National Cherry Blossom Festival - Washington, DC
Ask Dr. Ellie
Email-Reminder
DNSSEC-monitor - .SE DNSSEC - Trac
Slashdot | Suspect Freed After Exposing Cop"s Facebook Status
"Except that trash talk in locker rooms almost never winds up preserved on a digital server somewhere, available for subpoena."
Avoid Big Dental Bills with Safe and Inexpensive Products | Wise Bread
Maarch | Open Source DMS | Electronic Document Management System | IDARS | Integ...
vmktree » About vmktree
Terry Zink"s Anti-spam Blog : スパムフィルターと外国のスパム、第5部 - Japanese
The Deployment guy : Automating SQL Server 2008 installations
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
Windows PowerShell Blog : How to Create an Object in PowerShell
2008 - Windows Live
Point Blank - A Blog on SharePoint : 5 Immutable Laws of SharePoint
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
Jennifer Marsman : Building Applications with SQL Server 2008
Macsimum News - Macs more expensive? Not if you consider TCO
"The question is, when purchasing technology, do you want to pay now or pay later?"
Main Page - The iPhone Wiki
Vlad Tatarincevs"s Lotus Domino Blog
10 tips for sensible systems administration
Disk Structure, BIOS, DOS Boot Code, Assembly Language.
Investing for Your Future - eXtension
Rutgers NJAES: Personal Finance
IT Certification Community
Head First Labs from O"Reilly Media, Inc.
Very interesting take
Tim Anderson’s ITWriting - Tech writing blog » Hands on with ASP.Net Membership,...
Easy, Illustrated Instructions on How to Repair the Lens Mechanism of a Canon Po...
Arbor Networks | ATLAS Dashboard: Global
Linux Performance Tuning - Linux Forums
ETM
An Analysis of Conficker
GreenPrint :: Saving Money Today, Trees Tomorrow
Stanza: a Revolution in Reading | Lexcycle
Corporate Legal Exchange
Steve Rachui"s Manageability blog - ConfigMgr/OpsMgr : Backing up Hyper-V Virtua...
SQL Connectivity : SQLEXPRESS required as a user instance
Microsoft SQL Server Tips & Tricks : HOW TO DETECT SQL SERVER INSTANCES / FEATUR...
IBM developerWorks : Lotus : Lotus Notes 8.x Tips
Welcome to SPI — Welcome to SPI
Welcome to vm-help.com
SourceForge.net: Main Page - nconf
:: CWSandbox - Automated Malware Analysis ::
Robert Bruckner"s Advanced Reporting Services Blog : Tablix – The Matrix Revolut...
Alik Levin"s : Why My ASP.NET Application"s Performance Is Less Than Optimal?
Architecture + Strategy : Federated Search in Windows 7
Bruce Elgort
Terminal Services Team Blog : Migrating a Windows Server 2003 TS License Server
Basic Analysis and Security Engine (BASE) -- Homepage
More Linux tips every geek should know | TuxRadar
/var/www/peereboom.us/adsuck/index.html
Computer Data Storage Through the Ages -- From Punch Cards to Blu-Ray | Maximum ...
SharePoint Thinks, Links and Clinks : Shared Points for SharePoint... : SharePoi...
Terminal Services Team Blog : Top 10 RDP Protocol Misconceptions – Part 1
Aaron Stebner"s WebLog : How to perform a silent repair and uninstall of the .NE...
American Bar Association - Defending Liberty, Pursuing Justice
Vegetarian restaurants guide and directory of natural health food stores by Happ...
Bill Morein"s Weblog
FastCopy
Attributor: Program the Web
My Apartment Map Apartment Rental Search. Map Based Listings of Apartments for R...
Off-Line Windows Updates With CTUpdate | Symantec Connect
OER Commons
W3Perl - A free logfile analyzer
CMDB: The Key to Jump-Starting iTiL Success
/kevinbehr/home - The Blog of Kevin Behr co-author of Visible Ops
Jaspersoft - Open Source Business Intelligence
Enterprise Open Source Portal, CMS, Web Publishing, Collaboration, and Social Ne...
SharePoint BUZZ - Your SharePoint Community Portal
O3Spaces Workplace | Document Management and Collaboration
US ISV Developer Evangelism Team : Resources Available to Get Started with Windo...
Home-Account.com: Own your home account
Register Domain Names with moniker.com
Me about things... : Installing Windows 7 on a netbook
SharePoint Thinks, Links and Clinks : IIS7: Moving the INETPUB directory to a di...
Delaware Employment Law Blog :: Published by Wilmington, Delaware Employment Law...
Steven Cheng"s MSDN Notes : [ASP.NET]ASP.NET Performance tuning resources
SQL Server Setup : SQL Server 2008, basic slipstream steps
Team Individualism : Go Green with Visio
Microsoft Dynamics CRM - The Danish blog : Windows 7 Feature Walkthroughs
Good-Bye Computer Shopper - Computerworld Blogs
Minneapolis Colocation - St. Paul Colocation - Minneapolis Managed Hosting - St....
Volatility | Memory Forensics | Volatile Systems
RegRipper
B5TECH.COM - The Babylon 5 Tech-Manual.
ODI - Office of Defects Investigation
DeCSS Mirror
OpenDVD.org - DVD for every OS
Ian Palangio"s Business Productivity : SharePoint 2007 Enterprise versus Standar...
10 Papers Every Programmer Should Read (At Least Twice)
Doug Seelinger"s blog (The Agileer) : Win 7 Beta RDC Tease
Time to Work Together on Electronic Discovery - Electronic Discovery - E-Discove...
Things You Need To Know To Become An Apt Guru - Make Tech Easier
ferm - for Easy Rule Making
Carpe Datum : Using PowerShell to Discover Login Failures on SQL Server
MIS Laboratory - Resources for Information Systems Faculty and Students : How to...
From Mind To Words : Rename files using PowerShell ‘a one liner’
Neil Hutson - Windows Server 2008, Visual Studio 2008 and .NET 3.5 for developer...
Slick IT
Slick IT: SQL Server 2008: Self-Destructing Databases
Action plans and problem solving : Useful T-SQL queries for a SQL Server 2008 ad...
NicolBlog : NicolTIP#004: seven new keyboard shortcuts for Window 7
Engineering Windows 7
Lifehacker Top 10: Top 10 Things to Look Forward to in Windows 7
Microsoft SQL Server Tips & Tricks : How to backup SQL Server databases to a map...
Secure world : Why IT Department mandate X days password renewal policy in most ...
Managing IT in a downturn: Beyond cost cutting - The McKinsey Quarterly - managi...
Windows Embedded Standard (NT4e, XPe and beyond) : My first impression of Window...
From Mind To Words : 401.1 – Unauthorized, using Anonymous access (IUSR account)
Steve Clayton: Geek In Disguise : How To Stand Out At Work
KiWi - Knowledge In A Wiki - Home
Thrive
» Repair Tool of the Week: AVG Remover - Technibble - A Resource for Computer Re...
What is Our Email Retention Policy?
If broken it is, fix it you should : .NET Memory Leak reader email: Are you real...
UNIX Administratosphere
How to Change the World: Guest Post: Memo from Kafka"s Castle and What Employers...
SBSC Canada Blog : How do I get Microsoft licensing support?
Interface | matters: Embedding GTD Into My Life Systems
Blackberry, Bluetooth and a group of persons - By Ulrich Krause - eknori.de
Invoice & Estimate Software
VMware KnowledgeBase Article - Tips for configuring Microsoft SQL Server in a vi...
Phenom II x3 gets extra core with BIOS hack - SlashGear
Microsoft Office Project Support Blog : Project Server 2007: The continuing saga...
Office Hours Blog : What every Business Major should know about presentations
SQL Server Setup : How do I service SQL Server 2008
DailyTech - Microsoft Says It Has Fixes for 2,000 Windows 7 Bugs Thanks to Teste...
Tellumar Kampiva: Femto
Cisco: Visual Networking Index Free Application
IBM - Domino Server console and Windows Server 2008 Session 0 Isolation
How to refresh a SQL Server database automatically
LuxPM: The home of LuxPM
Encrypt Removable USB Drives with BitLocker To Go on Windows 7
rainpress - Google Code
Ports used for communication in Symantec AntiVirus Corporate Edition 8.x and 9.x
VisioCafe
Welcome to NJ Vistas
Stubborn Tech Problem Solving: A Linux user"s review of Windows 7 Beta
Windows 7 Feature Walkthroughs
markwilson.it » Active Directory design considerations: part 7 (domain controlle...
markwilson.it » Active Directory design considerations: part 6 (domain controlle...
markwilson.it » Active Directory design considerations: part 5 (security groups)
markwilson.it » Active Directory design considerations: part 4 (group policy obj...
markwilson.it » Active Directory design considerations: part 3 (organizational u...
markwilson.it » Active Directory design considerations: part 2 (forest and domai...
markwilson.it » Active Directory design considerations: part 1 (introduction)
Download details: SQL Server 2005 Best Practices Analyzer
How to use the Microsoft Group Policy Diagnostic Best Practice Analyzer (GPDBPA)...
Active Directory Blog : Group Policy Best Practice Analyzer
Home - Report Surfer by Angry Koala
Ruby on Rails in IIS 7.0 with URL Rewriter | RuslanY Blog
MIS Laboratory - Resources for Information Systems Faculty and Students : How to...
Association of Open Group Enterprise Architects
Developer Support Team Foundation Server : TFS Performance Tips & Tricks - Part ...
TechNet Magazine Homepage
Windows Administration: Designing OU Structures that Work
Download details: Security Compliance Management Toolkit
Real world problems; Real world solutions : IIS Compression failure - compressio...
basketweaving for the mind : IIS7.x, Server Farms and Ruby
InterServer, Inc - Advanced Hosting and Custom Dedicated Servers with Managed² s...
Email Fax and EDI Services from EasyLink
Active Directory Blog : VSS Snapshots and You
How to create custom administrative templates in Windows 2000
GP options not showing up for custom ADM
Group Policy editor by default hides policies that modify registry values outside of the 4 special policy keys. In order for you to see the policy you need to do the following:
Fixing your AD design with GPO Loopback processing
How To: Setting Up Active Directory Group Policies - Security - Network Computin...
12 Tips For Implementing Microsoft Office Project Server 2007
Florian’s Blog
ADM Template Repository
Group Policy
4 Steps Toward Recovering From a Tech Job Loss
SourceForge.net: mrsync (multicast remote sync): mrsync (multicast remote sync)
SharePoint Server 2007 - Training - Microsoft Office Online
MIS Laboratory - Resources for Information Systems Faculty and Students : How to...
SharePoint in Education
Alex Pearce: SharePoint Blog - SharePoint Blogs / SharePoint University
BizTalk Performance
CSS SQL Server Engineers : SQL Server: Is CHECKDB A Necessity?
Office Hours Blog : Office Ninja: Create an instant table (Excel)
Microsoft SMB Community Blog : Second Shot with Career Assist from Microsoft – T...
Microsoft Dynamics CRM Team Blog : Performance Testing using DbPopulator
Team Foundation Server - Setup, Administration and Operations Blog : Move from a...
Windows 7 Friday: Locking Down and Protecting Your Computer With AppLocker
Daniel Egan DotNetDoc : Online Windows 7 Event !!
Developer Support Team Foundation Server : TFS Performance Tips & Tricks - Part ...
MVP Global Summit 2009 Blog : SeaTac to Seattle: A Transportation Guide
Astrometry.net
Quality Software Engineering Strategies : Ever Wanna Know About a CLR Assembly?
Above the Clouds
Download details: Microsoft SQL Server 2008 Management Studio Express
Canadian Developer Connection : The 21st Century Software Development Organizati...
Public Sector Developer Weblog : Windows PowerShell is Awesome
Dave Glover "Down Under (Oz)" : Windows 7 "Remote Server Administration Tools" i...
Explore the UnExpected : FTP Commands Overview
Running SAP Applications on SQL Server : SQL execution plans, part 2: SQL compil...
Hans VB"s WebLog : Learning how to program?
Andrew Coates ::: MSFT : Windows 7 on my Mac Mini
The Personal Branding Blog: The Top 10 Secrets Successful Job Seekers Know
Education.com | An Education & Child Development Site for Parents | Parenting & ...
wissel.net :: Keeping track of events
tcpjunk - Google Code
jTimer - Home
gET iT i sAY .giis - ext3 File Undelete Tool
Take Windows 7 for a spin with VirtualBox
GiSTEQ Corp. TripBook
Coding4Fun : Debug 4 Life
Care, Share and Grow! : Increase the concurrent connections limit for IIS FTP si...
The Way I See It : IIS 7 Tip #1 Finding all the web.configs
Dave does Data : SQL Reporting "How to" - Conditional Color 1/4: The Basics. Rep...
Josh Holmes - Measuring ROI – Moving from Cost Center To Strategic Partner
DirectAccess with Devrim
Bryan Griffin"s Blog : Listing firewall exceptions with PowerShell - yes we can
Aaron Stebner"s WebLog : Repairing the .NET Framework 2.0 SP2 or 3.0 SP2 MSI fro...
SharePoint911 - Home
Windows 7: The Complete Guide
SQL Server Storage Engine
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
Canberra PFE : Check your tombstone
Team Individualism : Windows 7 Quick Keys – ZoomIt
mszCool"s thoughts and cents revealed : Cool Security Modules and Tools for IIS ...
New rules for the SAP SD benchmark - c0t0d0s0.org
Mommy Track"d | Managing the Chaos of Modern Motherhood
Wertarbyte EDV-Dienstleistungen - Backup system "Tartarus"
Accounting & Business Software | Free Web-Based NolaPro
Knowledgeroot Project Page
PNGCRUSH
Back Up LVM XEN Guest Containing LVs | HowtoForge - Linux Howtos and Tutorials
EV"s Best Top Rated HDTV Indoor Antenna Review Test Round-Up Guide - AVS Forum
TUAW Tips: Packing your gadgetry for travel to faraway lands - The Unofficial Ap...
SnTT: Notes Mail "Inbox Maintenance" - By Ulrich Krause - eknori.de
Impressive DAOS results - By Ulrich Krause - eknori.de
Available Command-Line Options for Smc.exe
LCD Monitor Repair - A Darker View
jkOnTheRun » Blog Archive Windows 7 Gains Mobile Broadband Support, Partners «
Secure your Visual Basic 6.0
Kirk Evans Blog : Free SharePoint Developer Resources
TechLeaders : Lost heads?
Marcelo"s WebLog : Gorgeous typography in Windows 7
Brendan on Windows Home Server : The most useful feature of Remote Desktop I nev...
Mike Ormond"s Blog : Twitter Script – Who’s following you (or not following you)...
Windows Embedded Standard (NT4e, XPe and beyond) : WES 2009 Tools on Win7
Mike Walker"s Ramblings about Industry Architecture : Massive P&P Compile of Res...
高橋 忍のブログ : Vista /7 の電源関連設定
From Mind To Words : HTTP COMPRESSION in IIS 6 and IIS 7 using Service Account
Chandru"s SharePoint / MCMS Blog ! : SharePoint Size !
60 CSS Tools to reduce your work load. | TheGermz.com
Stephen Kennedy"s musings on the Social Web : What is Twitter?
Nanda Lella"s WebLog : RSS feeds in IE not updating after upgrade from Vista to ...
W7 and Aircards : Windows 7 Hardware Compatibility : Windows 7 Beta : Microsoft ...
Tweak UI For Windows Vista : Ultimate Windows Tweaker From WinVistaClub
Windows 7 and EVDO Modems : EVDOinfo.com
GNUmed » Home
xstress :: xk0derz SMTP Stress Testing Tool
ShmooCon 2009: Chris Paget’s RFID cloning talk - Hack a Day
Ahh, The Ease of Introducing Global Routing Instability | Security to the Core |...
Jailer
SourceForge.net: ccma
Whatever I think of that deserves being posted: Bash Tricks I: (very) Repetitive...
More Fun With SSH
Get Help - DoIT - Stony Brook University
The Tao Of Backup
Aaron Stebner"s WebLog : Unified .NET Framework Troubleshooting Guide
The Linux and Unix Menagerie: The Absorption Of Knowledge In the Computer Age: T...
GutenMark, a Project Gutenberg markup program
Windows 7 Beta : Microsoft TechNet Forums
Active Directory Blog : Gauging Size Differences in AD Databases
Save Money with Regular Home Maintenance ∞ Get Rich Slowly
Open Source Business Resource
Free E2AF Cheat Sheet
Real world problems; Real world solutions : Debugging sSL handshake failure usin...
Alik Levin"s : What Do Solution Architect And Enterprise Architect Do?
Akshay"s Weblog : Custom adm file to enable an IE setting through Group Policy
Dougs Blog... Exchange Server daily : Blackberry without BES?
Windows Online Readiness Kit
CustomGuide - Free Computer Training Quick References, Cheat Sheets
Computer Science Teacher - Thoughts and Information from Alfred Thompson : Certi...
The blog of Rob Margel : Quick Reference Cards for Vista and XP
Real world problems; Real world solutions : installing & configuring debuggi...
monitoring hardware through vmware esxi and nagios | Ubergeek Technical Howtos"
About | Scan Tailor
Nightwing by: Lugro-mesh
Merb Mind Maps - O"Reilly Broadcast
PCI Compliance - Is it important to you that Notes & Domino play nice in this sp...
Waterfall Digital Photography
Free Podcast Interview on Collaboration Tools and Technologies : Lawyer"s Guide ...
CSS SQL Server Engineers : SQLIOSim: Default Testing Pattern
Canberra PFE : Checking the RID Pool
Active Directory Maximum Limits
WER Services : Kernel dump storage and clean up behavior in Windows 7
SharePoint Javascript Utilities - Home
Suresh"s Weblog : Windows 7 Task bar Download Status
Microsoft SharePoint Team Blog : Analyzing Microsoft SharePoint Products and Tec...
bluemind : Windows 7 Benchmarking
Real world problems; Real world solutions : Using Microsoft network monitor to t...
Microsoft on ISVs : Understanding Microsoft Virtualization Solutions from Micros...
Inside Office Online blog : Most popular time savers, starting with two from Exc...
VolkerW"s WebLog : Windows 7 and Server 2008 R2 Application Quality Cookbook
Manifesto for Agile Software Development
50 seriously useful Windows 7 tips | News | TechRadar UK
Action plans and problem solving : How to manage SQL Server 2008 by creating and...
Aaron Stebner"s WebLog : How to perform a silent repair and uninstall of the .NE...
Wi-viz: Wireless network environment visualization by Nathan True
Lotus Notes 8.5 version to version comparison
HDTV Antenna Selection Guide, Reviews and Information
Sweet home 3D interior home designer – design your home without architects | Det...
401(k) Failures: Over Last 20 Years, The Average Investor Did Worse Than Cash » ...
S-Corporations vs. LLC: Income Tax Savings Benefits » My Money Blog
Business Opportunities Weblog | Tweak Your Brain With Colors
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Awarding a medal?
TSM Monitor
MVU CareerForward - Take the Challenge
Download details: ADTD
Catalyst Switched Port Analyzer (SPAN) Configuration Example - Cisco Systems
The blog of Rob Margel : The English Language
Bill Lin"s Blog : DOS Command Script: Use Date/Time in File Names
Health & Education Technology Specialist : The architecture journal publishes gu...
Photography 101.5 - Aperture
diskus - Tools - Scylla and Charybdis
Change Log Manager
Extreme Surface Mount Soldering
Gray Hoverman Antenna build
The Gray-Hoverman Antenna For UHF Television Reception - Digital Home Canada
jkOnTheRun » Blog Archive Customize the Windows 7 “Send To” Menu Option «
OpenedFilesView - View opened/locked files in your system (sharing violation iss...
Piqqem | See how the crowd rates your favorite stocks.
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
How to Calculate the Volatility of Options
trapkit.de - ScoopyNG
Raible Designs | How To Setup Your Own Software Development Company
Easy Payroll for Small Business - Online Payroll Service
svchost viewer - Home
CK - Common Knowledge: to be shared and developed by all - ERP
Tidydoc : documentation organizer - Summary [Savannah]
BleachBit - file and privacy cleaner for Linux
PIE - Property Investment Evaluation
safecopy
SourceForge.net: SquidModel
How to manually add missing podcast episodes so they show up correctly in iTunes...
Doug"s AppleScripts for iTunes ♫ Welcome
Facebook Security | Facebook
PXE Manager
freshmeat.net: Project details for Silktree
Using system rescue CD to scan and delete virus in Windows | Learning On Demand
Great idea if the Hard drive isnt encrypted.
HOWTO: Wii remote in Ubuntu 8.04 - Ubuntu Forums
Cheese
Real Geeks do Peer Clouding - Linux Today Blog
TinyCA
Energy Information
Network Diagram Software
-:: Billy the Kids - Cisco SNMP Tools ::-
DailyTech - Updated: Windows 7 Editions Compared, With Table of Features
How to troubleshoot common Windows Update, Microsoft Update, and Windows Server ...
Finding Information on the Internet: A TUTORIAL - Table of Contents
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
IEEE Spectrum Online: Technology, Engineering, and Science News
Antennapoint.com - Antenna Locator
Marginal Revolution: Japanese cooperation
"technique of cooperation"
Windows 7 versus Linux on netbooks
Neil Hutson - Windows Server 2008, Visual Studio 2008 and .NET 3.5 for developer...
Tribal Knowledge in Software Logistics : Windows Installer 4.5 in Vista SP2 and ...
Virtual PC Guy"s WebLog : Fixed Disks vs. Physical Disks
Blog do Ezequiel : SQL Server 2005 and 2008 System Views Posters
Satisfy Me : Curious about the next Microsoft Windows 7 beta or release date?
US ISV Developer Evangelism Team : Learn About Windows 7 Deployment, Management ...
Useful IIS/ASP.NET Information provided by Microsoft Support Teams : Where is AS...
Microsoft SQL Server Tips & Tricks : How to reapply SQL 2000 SP4 to update all t...
Visual Studio Team System : PsTFS et Bowie : 2 addins pour Team Foundation Serve...
Teaching Ideas and Resources : Personalising learning - Enquiring Minds
James O"Neill"s blog : Managing Windows Update with PowerShell
Joe Sack"s SQL Server WebLog : MERGE Syntax - SQL Server 2008 Transact-SQL Recip...
Note to Fannie Mae: Dealing with Logic Bombs « noFUD - No Fear Uncertainty or Do...
In search of simplicity, quality and tranquility in software engineering : TeamR...
Hans VB"s WebLog : Windows 7 Ecosystem readiness program
Andrew Coates ::: MSFT : Ramp yourself up with Ramp Up
WesleyB"s Blog : Microsoft SQL Server 2008 Books Online - January 2009 Update
Computer Science Teacher - Thoughts and Information from Alfred Thompson : Explo...
Microsoft Office Project 2007 : Project Server + PerformancePoint Server
granth"s blog : Announcing TFS Performance Report Pack
TechLeaders : Change Management
Hanz Blog : How to fix the error when restarting Windows SharePoint Services Sea...
SQL Server Samples : The transition to community based development
Public Sector Developer Weblog : .NET Time Tunnel
Canadian ISV Evangelism Team : Windows 7 Resources
Terminal Services Team Blog : The Windows Server 2008 Terminal Services Resource...
Mike Swanson"s Blog : My Windows 7 Beta 1 Experience
Carpe Datum : Server Consolidation Done Right
Green IT Business Solutions - Green IT Solutions | Microsoft
Fix it for me blog
John R. Durant"s WebLog : Office 2007 (and beyond) Developer Resources: Looking ...
Chris Hopkins" Visilog : Source for Visio Toolbox add-ins released
TBD : Re-Thinking the way we do business in Japan
Virtual PC Guy"s WebLog : Mounting VHDs with Windows 7
Vance Morrison"s Weblog : MeasureIt Update: Tool for doing MicroBenchmarks for ....
Windows(R) Image to Virtual Hard Disk (WIM2VHD) Converter - Home
Christophe Fiessinger"s Blog : SharePoint Diagnostics Tool v1.0 for SharePoint P...
PHPBB Password Analysis - Hacked Off - Dark Reading
istartedsomething
CVE - Common Vulnerabilities and Exposures (CVE)
organic fertilizer: writing event log entries with powershell
Script Repository: Windows Update
The Business Justification for Data Security- Version 1.0 | securosis.com
Mooney"s BES Policy Recommendations
100 Powerful Web Tools to Organize Your Thoughts and Ideas | Online College Blog...
Nikon unveils Fabre Photo EX DSLR-based stereoscopic microscope - Engadget
How to build a powerful distributed computer | News | TechRadar UK
How to Be Faster at the Linux Command Line | HACKTUX
Speed up your Web pages
zsu - update serial numbers in DNS zone files - search.cpan.org
DomainKeys Identified Mail (DKIM)
NHK WORLD English
Global recession - where did all the money go? | Business | guardian.co.uk
Best articled Ive seen on this whole mess. mv=pq
DNS.NET
How To Practice Law Like Abraham Lincoln - Be an e-Discovery Lawyer! « e-Discove...
Metropolis - Japan"s Number 1 English Magazine
EEE PC - The unofficial blog about Asus Eee PC
How to Report and Identify Phishing, E-mail Scams and Bogus IRS Web Sites
Silent noise | - about spam, trojans and other nasty stuff
Microsoft Access forum, articles, and directory. More than 200,000 Access relate...
Capivara - Java FileSync
Twinkle - SIP softphone for Linux
dissy - Google Code
Back In Time | le-Web.org
Lotus Notes: Lotus Notes keyword shortcuts
Domiclipse :: Repton Plugin
GregAshbaugh.com » Blog Archive » How to Remotely Reboot Windows Server
Reboot a hung vertex server
Passport RFIDs cloned wholesale by $250 eBay auction spree • The Register
NearlyFreeSpeech.NET Web Hosting
Nutrient Data : Home
BTR - Break Thru Radio
YouTube - dropoutproductions"s Channel
Patrick Barkham talks to author Peter F Hamilton on life in the 34th-century | B...
"If you"ve enjoyed Battlestar Galactica, you should love my stuff,"
SearchServerVirtualization Blog - A SearchServerVirtualization.com blog
Creating virtual machine clones and templates without vCenter Server
FOSSwire
Recovering servers, virtual machines after power failure - SearchServerVirtualiz...
Love the list of server and applications.
Resolving VMware ESX problems without pulling the plug
JessWatts.com - If Want() Then Do()
VM Tips: VMC fails at 2% sysimage.fault.NfcConnectionFault - JessWatts.com - If ...
Investigating network devices and device settings as a cause of VMware Converter...
Ethics Resource Center: Celebrating 85 Years of Ethics Surveying and Research
Microsoft Dynamics CRM - The Danish blog : Proactive information - SQL Server Be...
Paul Andrew : SPDisposeCheck v1.3.1 is released
The Old New Thing : Games to play at your Battlestar Galactica watching party
Brad Smith"s blog : Don’t recycle the Application Pool for Central Admin site fo...
Running SAP Applications on SQL Server : SAP declares support for SQL Server 200...
Manage SQL Server Services from the Command Line
Monitor SQL Server Performance and Activity with Built-In Functions
Alice.org
Mike Walker"s Ramblings about Industry Architecture : Taking the Data Center to ...
Cyclops
Mike Ormond"s Blog : Updated Twitter PowerShell Script
Jump-Start Your Online Business with FairSoftware
How can companies that rely on technology consistently not pay for it? | Linux J...
Flying Solo, A How-to Guide for Turning Job Loss Into Opportunity
Wireless security - how secure is your data? « Tech Czar
M-Lab | Welcome to Measurement Lab
Use tools running on M-Lab to test your Internet connection. | M-Lab
Jeffrey Tastes
The case against Web apps |Fatal Exception | Neil McAllister | InfoWorld
Sriram"S: How to enable & disable USB ports
USB Glue: Super Endpoint Security Glue
A Nagios plugin for Sun hardware failure detection - Le Seb sur le Ouaibe
Project Galaxies - Full Project Gallery and History - Page 10 - NetworkIsDown
Motion Mountain - The Adventure of Physics : The Free Physics Textbook
SourceForge.net: IPv6 CARE
SPF Query Tool
XPerience ClearBox Enterprise RADIUS Server
Non Free but interesting solution
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Rexiology@MSDN : Self-Signed Certificate and Outlook VSTO Add-in Silent Installa...
Steve Rowe"s Blog : Alan Kay on User Interface Design
Le Café Central de DeVa : Virtualize your Exchange 2007 SP1 environment?
OpenPsa - OpenPsa 2: OpenPsa 2 - Manage Your Consulting Business
The MSDN Australia Blog : Get along to the new SQL User group in Sydney CBD focu...
Breakdown of the roles for managing MSSQL server
Is This Thing On? : Upgrading from SQL Server 2000 / 2005 to SQL Server 2008
 Continuous Data Protection (CDP), Linux Disaster Recovery, Server Backups for L...
No free but interesting
Japan for Sustainability
The SysAdmin Ten Commandments | HACKTUX
My Seagate hard drives are safe now | Steve Maller Photography
Fresh Wasabi - How to Prepare Real Wasabi Root Video - About.com
LS09Blackberry.pdf (application/pdf Object)
IBM - Download the Domino Attachment and Object Service Estimator tool
IBM - Domino Configuration Tuner (DCT) provides easy-to-use self-service configu...
Technical Services News - Cisco Systems
Cisco Support Wiki
WINOLJ-OOW2.0C
A Technological @mosphere
AKB 45023: Remote Altiris Agent Diagnostics
Secure BIND Template v6.6 23 DEC 2008 Rob Thomas noc@cymru.com
The Protocol Informatics Project
Online Backup: Multi-Platform, Multi-Computer | SpiderOak, Inc.
main: The Msgque Project
RefSense - Easy Access to PubMed
SnapCRM - Open Source CRM
PDFjam-README.html
Cloning Linux Systems With CloneZilla Server Edition (CloneZilla SE) | HowtoForg...
The Twitter Value Paradox - O"Reilly Broadcast
Auto Repair Price Estimates | Auto Shop and Mechanic Ratings : RepairPal
80% of Computer LOHAS: Virus-Free Life on a USB Key - Chao-Kuei"s Notes | 資訊.人.權...
Harry Seldon"s blog : Some useful commands in Linux administration when making a...
Jason Winters" Pico-Projects: Real-time Web Based Power Charting
The DomainPatrol Blog
AskDba.org Weblog
OTN Discussion Forums : Forum Home
Browser Test
Lotus/IBM: Domino - Domino Server shutdown automation
Welcome | Matroska
cloudvpn :: exa
SourceForge.net: ccma - Project Web Hosting - Open Source Software
Find "Em All
Play it slowly — 29a.ch - Jonas Wagner"s Blog
Lilith
TCP Banner
Public Radio Tuner
Guide: Windows 7 x64 Build 7000 on a Macbook Pro | Coffeestops!
The blog of Rob Margel : Detox your PC: Making your PC run smoothly
Vincent Belllet"s Blog [MSFT] - EN : Windows 7 : my first feelings with the beta...
Ron Jacobs : Windows 7 Beta 1 Installation Tip
Develop a Complete WMI Inventory Tool in Windows PowerShell
MSDN Virtual Labs
Windows 7 Developer Guide - Home
TechLeaders : Manage by Results - Managing remote employees part 5
Microsoft SharePoint Team Blog : How to create a SharePoint slipstream using the...
Chris Jackson"s Semantic Consonance : Helpdesk Elevation on Windows Vista and Wi...
Download details: Ultrasound - Monitoring and Troubleshooting Tool for File Repl...
Microsoft on ISVs : Welcome to Windows 7
Microsoft Certified Professional Magazine Online | Feature Article: File Replica...
Windows XP Utilities
Vibro.NET : Roles? Those are claiiiiiims!
Jennifer Marsman : My Favorite Feature in Windows 7
Clausl"s Dynamics NAV Blog : Using SQL Server 2008 Express
Varun Dhawan"s Blog : Benefits of Backup Compression - Faster BACKUP / RECOVERY
Satisfy Me : Your questions: what do I like about Windows 7? The Taskbar, saving...
SharePoint Site Configurator Feature - Home
Christophe Fiessinger"s Blog : Inventory of SQL Databases in a Typical Project S...
Microsoft Excel : Printing Envelopes Using Excel and Word
Performance and Capacity Planning Resource Center for Microsoft Office SharePoin...
Microsoft Dynamics CRM Team Blog : Tips for faster and better performance on Mic...
Action plans and problem solving : SQL Server Replication performance and Networ...
Back To Basics: Memory allocation, a walk down the history
Ian Palangio"s Business Productivity : 10 Ways Microsoft Office 2007 Can Save Co...
TJ-RAV : Swapping the disks (for example RAID 5 to RAID 1) using ClusterRecovery...
Tim Sneath : The Bumper List of Windows 7 Secrets
Sujit"s .NET and Windows Ramblings : Windows 7 Beta on a Mac Mini
Nick MacKechnie : Malicious Software Removal Tool removes Win32/Conficker.B
Ultimate List of Free Windows Software from Microsoft - Windows Live
A Short History of the Billable Hour and the Consequences of Its Tyranny : Law P...
Photojojo » Sensor Dust Is Evil. Here’s How to Banish It.
TechnoEsq » PDF Redaction Made Easy
Legal Technology - Five Tips for IT to Survive the Plunge
How to Write a Resume That Will Land an Interview | Dumb Little Man
overview [LBackup]
JBCobb.net » Post Topic » EZRip is dead! Long live DVD Metabase…
SylinkWatcher and SylinkMonitor - tools for real-time debugging of SPA 5.x and S...
Updating Symantec AntiVirus Corporate Edition virus definitions without using Li...
httpry
Around SAP Consultant
Sort IP Addresses with GNU sort
Profiling the Power Usage of a Desktop PC [LWN.net]
Create an Encrypted Samba Share | BeginLinux
Mastering SSH: Connecting, Executing Remote Commands and Using Authorized Keys
17 Telecommuting Pet Peeves - CIO.com - Business Technology Leadership
SourceForge.net: Unattended GUI and managment system
IBM developerWorks: Wikis - PowerVM wiki - lpar2rrd tool
Gnome Chemistry Utils
logdistiller - Overview
freshmeat.net: Project details for raidrec
superpodder - Google Code
storeBackup - Summary [Savannah]
PBS Helpdesk Start
Famous Awk One-Liners Explained, Part I - good coders code, great reuse
Famous Awk One-Liners Explained, Part II - good coders code, great reuse
Famous Awk One-Liners Explained, Part III - good coders code, great reuse
The great window manager speed test.
Tools to delete files securely in ubuntu Linux -- Ubuntu Geek
Computing Tech: What Is SMB?
The Linux and Unix Menagerie: Understanding Perl Variable References On Linux An...
Help For Linux: 5 GIMP Tricks Everyone Should Know!
Graphics from the command line
Setting Up A High-Availability Load Balancer With HAProxy/Wackamole/Spread On De...
Net Direct :: Open Solutions
Learning Haskell - O"Reilly Broadcast
Win Server 2008 Directory Services, Active Directory Snapshots
NetWrix Christmas Gifts: Freeware Tools! Report on AD Changes, Track Inactive Us...
p2vd.com - a virtualization and server consolidation blog
Visio Guy
eee Mac journey
Ecofont | less is more
squidstats - Google Code
:: Cybertelecom ::
Download details: The Services and Service Accounts Security Planning Guide
Nagios single sign-on authentication with Active Directory | ITeF!x
AWC - Aviation Weather Center
Turbulence Forecast - Air turbulence maps and forecasts
FlightTrack - Live international airline flight tracker and real-time flight map...
iFreeBudget
Home
I dont know what this is yet. It looks like some weird Hybrid
pdfposter | Pdfposter
SymmetricDS - SymmetricDS
MyIpTrack - Keep track of your used IP addresses
urlwatch - a tool for monitoring webpages for updates (thpinfo.com)
sshguard - protect from brute force attacks against ssh
UPnP-Inspector - Coherence - a DLNA/UPnP Framework for the Digital Living - Trac
How to use ADPlus to troubleshoot "hangs" and "crashes"
LepoLand - A Blog by Alan Lepofsky - Alan"s blog about software, technology, tra...
The World Question Center 2009
IBM - Running nlnotes.exe in the Domino directory while the Domino server is run...
Stanford School of Engineering - Programming Methodology
Apple iPod Touch - News, Views, Reviews, Accessories, Rumors & more
Vista Forums
Esoteric : SQL Server 2000 / 2005 Failover Cluster Pre-installation Checklist
Internals Viewer for SQL Server - Home
Steve Clayton: Geek In Disguise : Cut Out and Keep Guide to Web 2.0
Building A Web Application Security Program: Part 7, Secure Operations | securos...
TechnoEsq » Electronic Signatures in Legal Documents
I’m an Organizing Junkie » Enjoying life one pile of clutter at a time
securosis.com
macminicolo: Mac Mini colocation | Time Capsule Colocation
How to make Juice 2.2 work in Windows Vista | Chris Pirillo
Via Randall Lind (who sent an email to Todd and myself earlier), here’s how to make Juice 2.2 work in Windows Vista:
Spore - Another Game Using SecuROM - GamingBOB.com
Front Seat - Software for Civic Life
gailvazoxlade.com
Esoteric : Howto: Have a Clustered instance of sql SERVER listen on multiple vir...
Windows to Unix With PuTTY and Xming
Team System: Streamline Team Projects With Process Templates
Inlab Software GmbH - RBridge - A Remote Ethernet Bridge for Linux
MSDN Magazine Homepage
Extensions for Windows - The Unofficial Windows Upgrade
Is This Thing On? : Reducing Data Center Cost with an Air Economizer
Session Destroyer: Automatic Webapp Session Invalidation | Linux Journal
SNAP-Ed Connection: Recipes Finder
How To Repair & Recover Data From Damaged CD’s Or DVD’s | MakeUseOf.com
From Mind To Words : Don’t see enough log in IIS logfiles.
www.hakin9.org - About the mag
the [non]billable hour: Ten Rules for Law Students
DBReplicator | Open Source Database Replication
howtos:lotus_domino_monitoring_using_snmp - Unixclinic
PSP Fanboy
PSP 411 - PlayStation Portable - Reviews, Games, Forum
Nagios Plugins from The Measurement Factory
Nagios Plugin Scripts for TLDmon | DNS-OARC
Terry Zink"s Anti-spam Blog : Cyberwarfare 101: Case Study of a Textbook Attack,...
Terry Zink"s Anti-spam Blog : Cyberwarfare 101: Case Study of a Textbook Attack,...
Notes from SQL Server Premier Field Engineer : Detecting volume/disk partition a...
Notes from SQL Server Premier Field Engineer : Acting on SQL Server errors
Dave Glover "Down Under (Oz)" : My ASUS Eee PC 1000H Netbook and Windows Vista E...
jamesgoulding.com home page
Free Language | Lessons, Podcasts, Courses, Audio, Video, Reviews, Articles, Stu...
aoiko.net - thing related to japan and japanese language
Notes.ini entries -- By Entry
The Taking Notes Podcast
How to properly perform a backup of Lotus Domino with Backup Exec 9.x and 10.x f...
How to perform a local installation of the Backup Exec Remote Agent for Windows ...
The NOC Project
SourceForge.net: hourglass » home
SvOlli"s EeePC hacks
CSS SQL Server Engineers : Using SQLIOSim to Diagnose SQL Server Reported Checks...
CSS SQL Server Engineers : How It Works: SQLIOSim - Checksums
Scott Bellware: Chief Engineer
Esoteric : SQL Server setup log locations and more
SQL Server Storage Engine : Managing TempDB in SQL Server
J.D. Meier"s Blog : Know Your learning Styles
Nice things inside SQL Server : SQL Change Tracking in SQL Server 2008
Using Repadmin.exe to troubleshoot Active Directory replication
IP SLA Monitoring - CT3
HumanLight Home
The Setspn.exe tool incorrectly adds the dollar sign to the host name when you r...
The Power of the Lotusphere Community
GonzoWiki » StartPage
Kroll’s Report and Analysis of the Most Significant e-Discovery Cases in 2008 « ...
Free Utilities from SystemTools Software
nginx
Active Directory Replication Troubleshooting Part 3 - Event Id: 1265 Access Deni...
Active Directory Replication
Error Message "Target Principal Name is Incorrect" When Manually Replicating Dat...
GameFAQs: SimCity 4 (PC) FAQ by thy451
SimCity 4/Walkthrough — StrategyWiki, the free strategy guide and walkthrough wi...
Dana Duncan Photography
Rebel 13"s Sim City Site
SC4EVER.COM"s SimCity 4 Resource Center - Welcome!
TechLeaders : Managing Remote Employees - Part 2
Beth Massi - Sharing the goodness that is VB : Attaching a Local SQL Express Dat...
TechLeaders : How to Manage Remote Employees - Part 1
Anthony Bloesch"s Web Log : SQL Server fragmentation
Habitat ReStores -- Habitat for Humanity Int"l
Resplendence Software - WhoCrashed, automatic crash dump analyzer
Lawyers USA
The Mortgage Professor"s Website
About JRB Software
Phreaking, Caller ID Hacking - Welcome to artofhacking.com!
UNetbootin - Homepage and Downloads
Hot Tips
VMware Communities: ESX_SRRSecure - Script to allow ESX to ...
BarracudaCentral.org - Technical Insight for Security Pros
Ode to eBay « Fractal Folds
resign via poetry, it is, umm, poetic?
Catbird Compliance Enforcer
Bucaro TecHelp Articles : Finding a Job : Job Interview Tips From a Corporate In...
odd site.
Lack of policy adds to e-discovery cost and complexity - Network World
How to track database growth across multiple SQL Server instances
Secure File Transfer - Large File Transfer - Enterprise File Transfer - Accellio...
SharePod
Download details: SQL Server 2005 Books Online (December 2008)
Complemento. Collection of tools.
The Information Technology & Innovation Foundation
The Blog of Ben Rockwood
Ten Common Database Design Mistakes
Brad"s Sure DBA Checklist
Macsimum News - Portables Fast Start: The new user’s guide to Apple notebooks
Concern Worldwide
Stack Overflow
Open Text Summarizer
Law Firm IT
How to Turn Your PSP into a Wireless Digital Photo Frame | Chris Pirillo
Closet Organizers by EasyClosets. Buy Custom Closets Direct Online.
Zibu
HIMSS (Healthcare Information and Management Systems Society)
Healthcare IT News
Limit the size of incoming email attachments to a Lotus Domino server
Limiting Attachment or Email Size - BlackBerryForums.com : Your Number One Black...
Mario Kart Wii Walkthrough - IGN FAQs
mailertable test script
Instructables - Make, How To, and DIY
Sprites mods - Welcome - Welcome!
Ruby for systems administrators
ImagineFX | Home
CYBSEC Security Systems - SAP Security
CYBSEC Security Systems - sapyto
LinuxPlanet - Tutorials - Understanding Tunneling: Hiding Packets In Plain Sight...
EasyLinuxCDs.com » Ubuntu Training Index
Nipper - The Network Infrastructure Parser
PHILLIPS MICROTECHNOLOGY, INC. (ENG)
Security Configuration Guides
Magic Tricks With the Sysreq Key
TestLink - open source Test management
The ELOG Home Page
Get to know your logging options in the Cisco IOS
What is UPR?
Rackwise - Take control of your IT Infrastructure Documentation with Microsoft V...
HVAC-Talk: Heating, Air & Refrigeration Discussion - Powered by vBulletin
South Park Studios
How to make a disallowed-by-default Software Restriction Policy
Ask The Admin » Blog Archive » Guerrilla Event Log archiving: why and how.
Shadowserver Foundation - Main - HomePage
ILTA
The Blawg 100 | ABA Journal - Law News Now
AuditNet SAP Audit Resources
The ORIGINAL HIPAA Training Resource, HIPAA Experts, HIPAA Compliance
davidwatson.org: Asus X83VB-X1 Running Linux 64-bit Kubuntu Intrepid Ibex 8.10
Strawberry Perl
Warranty Validation
wraprancid
Series of DNS Cleanup Scripts | en Passant
Script to Find DNS Server settings - PART I - please check article at MS web for...
dailywireless.org » FiOS: Too Risky?
Jase"s Place: Go Daddy Wildcard Certificate with VI3
Suspect a Performance Problem? Just Call Your PAL | Symantec Juice
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
Economic Indicators.gov
Underwriters Laboratories Inc.
Download details: 2007 Microsoft Office System Migration Guidance: Microsoft Off...
Awethumb - Unleash the Power of your PDA
Confused by WEP, WPA, TKIP, AES & Other Wireless Security Acronyms? | Darknet - ...
Action plans and problem solving : Windows, SQL Server and the Antivirus don"t g...
Legally Minded - Legal Professionals. Your Community. Your Network.
10 Things You Should Never Write in an E-Mail or Instant Message - CIO - Blogs a...
KeePassX - The Official KeePassX Homepage
jPdf Tweak - Swiss Army Knife for PDF files
JCrypTool
Areca Backup - Home
Remote BHO Scanner: Detecting malware on corporate networks
RedNotebook « digitaldump
E.W.Dijkstra Archive: Home page
Gardeners Supply Company - Garden Supplies, Tools, and Gardening Tips
Interesting Things for ESL/EFL Students (Fun English Study)
The Spamhaus Project - DROP
Katakana - Japan Reference
The OakTable Network: Main
TrendLabs | Malware Blog - by Trend Micro
Oracle DBA Forum, Articles, FAQs, Scripts, OCP Test Papers, Free Blog, DBA Train...
Oramon: Free Oracle Database Monitoring Tool
Carlos’ Corner
MOSSy Business : The Minimal Full-Deployment Infrastructure
Developing for Dynamics GP : Useful SQL Scripts Series
Twitter Grader Badge | Show Off Your Twitter Grade
Silverlight Spy : First Floor
Media And Microcode : Microcode: PowerShell Scripting Tricks: More Joy of Hashta...
Eqonomize! - easy and efficient bookkeeping
Twenty Rules for Amazon Cloud Security - O"Reilly Broadcast
Installing Squid Cache for Windows | Markus Blog
| The Public Domain |
Language Codes - Sorted by Locale
http://msinetpub.vo.llnwd.net/d1/keithcombs/downloads/Add_Users_and_OUs.txt
FireCAT 1.4 : Firefox Catalog of Auditing exTensions
:: Online Monitor test - Your free online TV and monitor test tool - By vanity.d...
SysAdminHell
Virtual PC Guy"s WebLog : The Domain Controller Dilemma
Computer Science Unplugged
Top 60 popular Japanese words/phrases of 2008 ::: Pink Tentacle
10 Tips for More Effective PowerPoint Presentations - Stepcase Lifehack
A Recovery Plan for a Superbad Superblock
Primecell Rechargeable Battery Service
Welcome to d-cubed
Linux.com :: TiddlyWiki derivatives help you get things done
StopDuplicates Copyright(c) Azzam ALNIJRES, Kaesar ALNIJRES
crunchyfrog - Google Code
Installing a Corporate Directory without using OTM / MAT - Nortel: Meridian syst...
IIS troubleshooting, administration, and concepts.
Typealyzer
mylvmbackup
Highly Secure Online Password Keeper
start - Etherboot/gPXE Wiki
The Suretec Blog
Waterloo Community Gardens
TaoSecurity: Digital Asset Scorecards
Print - Demystifying SQL Server Virtualization
Ask H&FJ | Hoefler & Frere-Jones
Pumpkin Pudding ♥ | A Veggie Venture
Red Ramekin: Simple Pumpkin Soup
notify.me - Stay update on the information that matters
Slife Labs, LLC
MS Deploy - Microsoft"s new tool for deploying web sites - InstallSite Blog
The Linux and Unix Menagerie: Bash Cable, Dish and Local TV Listings Script For ...
Kernel oops bugcount
LinuxPlanet - Tips - Tip: Simple Regular Expressions For Reviewing Log Files - C...
Mobius Forensic Toolkit - Summary [Savannah]
slurchin - Google Code
Download details: Active Directory Migration Tool v3.0
PaulDotCom: Archives
perl.com: Automated GUI Testing
Linux.com :: Speed up your Internet access using Squid"s refresh patterns
ProPublica - Journalism in the Public Interest
ike-scan
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
New York Songlines: Virtual Walking Tours of Manhattan Streets
Home
The Japanese Slang Jiko
Language exchange SNS Lang-8
Culture at Work: Home Page
Network Documentation Policy
AIChE Home Page
Linux.com :: Discovering your network with Netdisco
e-Volve Gadget Shoulder Holsters
The Official Site of Game Key Revealer and SoftKey Revealer - SoftKey Revealer
Blog : Brian Desmond"s Blog
Free Online Barcode Generator
The SWIPE Toolkit
Compare My VM
What a Lovely Name, The perfect name for your baby.
PacketLife.net
Agilefant - The Finnish Ferrari for backlog management for the price of a Linux ...
LAMS Foundation
The 1352 Report
Frink
ora2html
Japanwoodworker - Home - The Japan Woodworker Catalog
Microsoft License Advisor
Windows Performance Tools Kit, v.4.1.1 (QFE)
Swingbench
Oracle ORION Downloads
Xirrus: Switching Without Wires - Advanced IT Wi-Fi Networking Tools
Overview of the Microsoft Configuration Capture Utility (MPS_REPORTS)
Glassdoor.com - Company Salaries and Reviews
Welcome to DeepDyve
The Elements of Style
Workstir | Mixing up the marketplace.
Best Buy sheds lost revenue tears, shares holiday fears • Channel Register
"Adjusting" in the biz is usually code for "firing" and "closing"
Main Page - DigitalNomadWhitepaper
Digital Nomad
Welcome to the Society for Technical Communication
ShadowExplorer.com - About
archivemail – a tool for archiving and compressing old email
TechSoup - The Technology Place for Nonprofits
Pantry, command-line nutrient analysis
The Observatory
c0t0d0s0.org
Welcome to CAcert.org
Green Seal
"Green" Hotels Association
Privacy Rights Clearinghouse--privacyrights.org
TravelSmith Travel Clothing, Travel Accessories, and Luggage from TravelSmith Ou...
Radiology Workflow Solutions | RIS PACS | eFilm Workstation | North America | Me...
The Phoenix System for MapReduce Programming
TypeLogic Home Page
Adrian Cockcroft"s Blog
Management by Matrices
IDEAS: Economics and Finance Research
Changing minds and persuasion -- How we change what others think, believe, feel ...
EconPort - Home
Behavioural Finance
The Psychology of Security
dokuwiki [DokuWiki]
http://www.isc.org/sw/bind/docs/dnssec.html
DNSSEC - DNS Security Extensions
Inventory Solution 7.0 Database Schema – Part 1: Operating System Inventory | Sy...
IBM LOTUS ADVISOR -- The Advisor Guide to IBM Lotus Notes, Lotus Domino, Lotus S...
TaoSecurity: Marcus Ranum on Network Security
PSS SQL Server Engineers : Cumulative Update 1 to the RML Utilities for Microsof...
5 Windows tools to remove damaged antivirus programs - Download Squad
Sounds of hard drives needing data recovery - Datacent
MidpSSH | SSH and Telnet client for Mobile devices (MIDP/J2ME)
pmooney.net :: Links / Resources
How to Integrate windows Active Directory and Samba in Ubuntu -- Ubuntu Geek
Microsoft Windows Silent Adhoc Network Advertisement
Enterprise 2.0 Conference: Intellipedia Briefing
OSS Simple Sabotage Manual
A Secure Nagios Server - The Community"s Center for Security
Nagios Business Process AddOns
syonex: Resources
Main Page - NagiosWiki
NagiosForge
The Power of Writing Things Down | Dumb Little Man
Forensics for Handheld Devices
School of Everything | Where Teachers And Students Find Each Other
EduBubble — A site about the book: Beating the College Bubble
securixlive.com :: securix-nsm :: main
BlackBerry Enterprise Server (BES) Compatibility Matrix Download (PDF) | BlackBe...
http://na.blackberry.com/eng/support/software/BES%20-%20DOMINO%20ver%20Oct%2008.pdf
Official Google Mobile Blog
SAGE System Administrators" Code of Ethics
J! Research: A Joomla! Research Management Solution | J! Research
ns4 - Configuration Management Tool - Home
RRDtool - About RRDtool
SparkFun Electronics - News - 2008.11.09
Main Page - Test Anything Protocol
Notes/Tasks
Linux.com :: Automated processing tools for better digital pictures
Trinity Rescue Kit | CPR for your computer
USBDeview - View all installed/connected USB devices on your system
Emergency Management Institute - FEMA Independent Study Program
ICS eTool: Home
The SysAdmin Group - The SysAdmin-BodyOfKnowledge
IVT BlueSoleil
FrOSCon: Home
Configure SSH Access to Cisco Switch and Routers - Associated Content
How To Copy a System Image from One Device to Another - Cisco Systems
mysfitt.net :: Log Minion
Shell scripting: Write message to a syslog / log file
DataCenter Diagram
visualcomplexity.com | A visual exploration on mapping complex networks
netdisco-install-english
Linux.com :: Discovering your network with Netdisco
Netdisco Install Scripts
Bob and the Knowledge Factory / Analyze small memory dump files in Windows 2003
Creating PDF Test-Files « Didier Stevens
League of Professional System Administrators |
San Diego Supercomputer Center
Managing Windows with CFEngine and Perl
Automating Network Administration, Part One | O"Reilly Media
Human Factors Considerations for Passwords and Other User Identification Techniq...
Speeding Up DNS Access In Regions With Very Low Infrastructure | HowtoForge - Li...
Using IPv6 On Debian Etch | HowtoForge - Linux Howtos and Tutorials
5 Things Every Good Linux Administrator Knows
3 More Things Every Good Linux Adminstrator Knows
Linux.com :: Linux print server enhances library printing
Relational Database Technology: A Crash Course - O"Reilly FYI Blog
Open Clip Art Library Drawing Together
Public Domain Clipart optimized for word processors
Clipart Gallery - OpenOffice
Certificate revocation list - Wikipedia, the free encyclopedia
Welcome to Matt"s Web Pages!
VNCcrack
STAsoft.net - webservices and outsourcing for you
Brain Workshop - a Dual N-Back game
SourceForge.net: etch » Introduction
Pining for the Fjords
Ben"s search engine and US postal zip code guide
Articles Index - Home Improvement Articles - Super Home Center
NFS: Overview and Gotchas
LIGO - Laser Interferometer Gravitational Wave Observatory
The Backup Blog: Free Avamar for VMware
Twuffer - Schedule Twitter tweets.
wissel.net :: Domino Server and Domino System Template Versions
Learning to Code Properly | Fri 7 Nov 2008 | Blog | CodeStore
CoRD: Remote Desktop for Mac OS X
Generating New Ideas « .:: computer geek’s diary ::.
Slipstream Microsoft Office 2003 SP3 into Microsoft Office 2003 CD « Be your own...
Make Time with Action Programs « .:: computer geek’s diary ::.
Using UrlScan : Configuring Security : Installing and Configuring IIS 7.0 : The ...
Microsoft Assessment and Planning Toolkit
Vipul Shah"s SQL Blogs : Understanding Perfmon Counters while troubleshooting SQ...
Performance counters
Performance Monitoring - Basic Counters - SQL Server Central
Understanding SQL Server Performance Counters - ExtremeExperts
Greg Miller"s Guide to Lock Picking for Beginners
Access Control: Understanding Windows File And Registry Permissions
9 Useful Sites For Finding People To Follow On Twitter | MakeUseOf.com
KMWorld.com: Records management: BEWARE, PREPARE
Gavin Bollard - Computing and Lotus Domino: How to Retain more than a few Blackb...
World War II Story -  Third Army - Europe - by Robert F. Gallagher
Chapters In Web Security: MultiInjector released - automatic parallel website In...
Altiris Notification Server 6 SP3 - Security Vulnerabilities | Symantec Juice
nSynergy International Pty Ltd
the electric sheep screen-saver
BlackBerryNews.com
BlackBerry Expert Support Center
Kilala.nl - Home of Thomas Sluyter and Marlijne Stek
Main Page - Nagios Wiki
SpyFu
TimeVault - Ubuntu Wiki
Open ...
What Anti-Virus scanning exclusions should be considered for system and servers?...
Multiple symptoms occur if an antivirus scan occurs while the Wsusscan.cab file ...
Virus scanning recommendations for computers that are running Windows Server 200...
Managing Comain Controllers: Active Directory
Up and down scripts for wwwoffle
WWWOFFLE Homepage
Lukas Beeler’s IT Blog
Printers and Network Printing
HP"s History Of Printer Command Language (PCL)
How to use Tor to audit networks :: SearchSecurity.com.au
Infrastructures.Org: Best Practices in Automated Systems Administration and Infr...
Brage - CM Home
Linux
Medibuntu :: Multimedia, Entertainment & Distractions In Ubuntu
http://www.dawnstar.com.au/wpshelp/basics.html
Install all Acrobat 8 patches in one step with Adobe Bootstrapper and patch sequ...
VMware Infrastructure Management Assistent (VIMA)
PocketSOAP
IP Organizer
Photojojo » Photojojo’s Ultimate Guide to Taking Portraits at Night
Microsoft Advanced Windows Debugging and Troubleshooting
LinuxPlanet - Tips - Bash Tips: Speedy Keyboard Shortcuts - Speedy Bash Shortcut...
UBCD for Windows
DbVisualizer - The Universal Database Tool
Using the Dell™ Driver Reset Tool
check_ad | ITeF!x
UTF-8 Cygwin
Dan Silva .org: How to use Lotus Symphony in English
What is 1033 « HowTo
Decode the product GUID for Acrobat or Adobe Reader (Windows)
MSIDIFF - Decompiles Windows Installer Databases (MSI, MSM etc)
MAKEMSI - Make MSI based installation files. Can automatically build new or upda...
Download details: SQL Server Database Publishing Wizard 1.1
IBM - Agents for updating Calendaring and Scheduling entries and Resource Reserv...
UPS: WorldShip
Enterprise Search from Microsoft
Free?
dpkg-diff openDesktop.org
UnusedPkg CLI-Apps.org
daptup openDesktop.org
Ubucleaner openDesktop.org
APT utility openDesktop.org
SecuriTeam - SSHFuZZ - Perl Based SSH Fuzzer
Common threads: Sed by example, Part 2
the [non]billable hour
Law Firm Web Strategy :
The eDiscovery Paradigm Shift: Electronic Data Discovery Workflow and Best Pract...
Linux.com :: Secrets for controlling VirtualBox from the command line
bulletin_ndr.pdf (application/pdf Object)
esXpress
SourceForge.net: Nipper 0.10.3 Released
Configure SSH on your Cisco router
Practice Cisco router configuration using a free emulator | Network Administrato...
How to properly secure your Cisco router with passwords | Network Administrator ...
How to Configure a Cisco Router as a Terminal Server
Learn how PCI affects Cisco network configuration | Network Administrator | Tech...
Happy Router .com
vmprofessional
Tux Training » Blog Archive » How to make Ubuntu extremely fast
Stuff for your Windowmanager - Box-Look.org
Ten Tips for KDE 4.0 Beginners | Tombuntu
Find Open Source Alternatives to commercial software | Open Source Alternative -...
The Linux and Unix Menagerie: Linux/Unix Shell Script To Find Your Google Page R...
MailChannels | Anti-Spam Blog
Deployment Solution for Dell Servers Demo Videos | Symantec Juice
$ClaudioG.Blog = $True : Eseguire WSUS 3.0 Cleanup Manager via Powershell
Cutting with a Scalpel: IT Budget Planning in a Down Economy : VMblog.com - Virt...
The new IT mantra is both pragmatic and progressive: tangible benefits today, while laying the foundation for transformation tomorrow.
Sysprep Script for Automatic Deployment XP and Win2003 | Symantec Juice
Lazy Linux: 11 secrets for lazy cluster admins
TuxArena: 5 Simple APT Tricks for Debian and Ubuntu
ThreatExpert Blog
China Channel Firefox Add-on - Experience the censored Chinese internet at home!
The ipv6calc Homepage
Understand IPv6 Addresses
eDiscovery, Digital Evidence and Information Security Law - Info Tech Law On The...
FedEx Ship Manager Software - FedEx Ship Manager Download
Oracle Database Benchmark
Anti Malware - Comodo BOClean
ZIM - A Desktop Wiki / Note Taking App [Linux, Windows] | MakeUseOf.com
Which communication ports does the Symantec Policy Manager 5.x use?
Symantec Endpoint Protection 11.0 Frequently Asked Questions
How to Obtain the Dell/HP (May be other vendors) service tag in Debian -- Debian...
Dell Client Manager™ - Altiris, Inc.
Minefield Start Page
faster firefox
IBM - Notes/Domino background agent fails to send mail; Errors may occur in logs
Getting Drunk in First Class - Humorous Consulting Stories Published in Rightsiz...
Cheap Flights, Airfare, Airline Tickets, Cheap Travel
XSS-Proxy: A tool for realtime XSS hijacking and control
10 Awk Tips, Tricks and Pitfalls - good coders code, great reuse
Fairly good awk explanation.
mitsubishi.com Mitsubishi Companies
TaoSecurity: Windows Syslog Agents Plus Splunk
TweakXP.com - Access Stored User Names and Passwords with rundll32.exe
Sumatra PDF viewer by Krzysztof Kowalczyk
phpSchedule"Em | News
Running SAP Applications on SQL Server : Analyzing a HANGMAN log file, part 1
ACPI BIOS Guideline for Linux (PDF)
Best Cheap Eats - Best cheap restaurants around the world
Reggy - Home
Yet another reason why I need a Mac
Removing unwanted AutoPlay Handlers in Windows XP and Windows Vista
CDBurnerXP: Introduction and News
stealthpuppy / Aaron Parker’s IT infrastructure blog
[Open XML] PowerTools for Open XML installer , Julien Chable
Tasque - GNOME Live!
InstEd It! - InstEd - Make packaging more productive
Verbose Log Analyzer | Symantec Juice
VoIP Communications Management Specialists - Cypress Communications
Nortel: Meridian systems - i2004 VoIP - Securing the set config?
Linux on a Mikrotik 532a , Part 5 Final - OpenWRT and Custom Scripts | Adam"s Te...
Linux on a Mikrotik 532a, Part 4 - Customization, Debian Scripts, Shaping, Firew...
APNIC Box - Linux on a Mikrotik 532a, Part 3 - Installing Debian, Prebuilt Disk ...
APNIC Box - Linux on a Mikrotik 532a, Part 2 | Adam"s Tech Talk, Linux HOWTOs & ...
APNIC Box - Linux on a Mikrotik 532a, Part 1 | Adam"s Tech Talk, Linux HOWTOs & ...
Blog_ /
SoCRA The Society of Clinical Research Associates, Inc., is a non-profit, profes...
National Electrical Code
AKB 1859: Items to help improve Console and Server performance in Notification S...
AKB 18828: How can I do defrag database indexes on SQL 2000?
lm2ntcrack - Microsoft Windows NT Hash Cracker (MD4 -LM) | Darknet - The Darksid...
Core Configuration Console | Nullsession.com
Inquisitor hardware testing platform: About
Download details: Office Security Guide
Office et SharePoint pour et par les administrateurs : Microsoft Office 2007 Sec...
SharePoint Price Calculator
Microsoft ® Windows Server ™ 2003 Performance Advisor
Commercial News USA - Showcase for American made products and services
Windows 2003 Performance Monitor
Small Business Administration - Free Online Courses
Home - Apatar - Open Source Data Integration & ETL
ASPInsiders
SQL Protocols : Troubleshoot Connectivity Issue with SQL Server Express 2005
SQL Protocols : Troubleshoot Connectivity Issue in SQL Server 2005 - Part II
SQL Protocols : SQL Server 2005 Connectivity Issue Troubleshoot - Part I
SQL Protocols : Named Pipes Provider, error: 40 - Could not open a connection to...
sqldbatips.com blog
Supervision d’Asterisk avec Nagios
Downloads - Switches - Cisco Systems
Roadkil.Net
BooZet Freeware » Products » Double Driver
Ask The Admin » Blog Archive » Rebuilding your Blackberry
LBNL"s Network Research Group
Main Page - Sys admin Wiki - a Wikia wiki
BGPmon.net : Welcome to BGPmon.net, a BGP monitoring and analyses tool
Sysadmin - Scratchpad Wiki Labs - Free wikis from Wikia
Home
Main Page - SysadminHell
Security Stories and Help with Network Documentation — Ogenstad.net
NSIT: Network Documentation and Troubleshooting
Ask The Admin
netdot - Trac
Computer Security For Home and Small Business - Defending The Net
ConsultantCommons.org | Sharing Tools for Nonprofit Technology Support
The Computer Technology Documentation Project
Network Documentation Made Easy with SYDI
Hmm already found this once, must remember to look at it!
Azerblog: Making a Bootable USB from DVD image
Introduction to Algorithms - good coders code, great reuse
Private Virtual LANs
Private VLANs Revisited - CCIE Blog
Understanding Private VLANs - CCIE Blog
Spreed News Home
PasTmon: HomePage
78 Ways for Your Small Business to Save Money in this Economy - Inside CRM
InsideCounsel Homepage
"Obscurum per Obscurius" : Configuring SMS to Work on Workgroup Computers and Co...
LessWatts.org - Saving Power on Intel systems with Linux
The Not So Short Introduction to Getting Into Medical School
The Student Doctor Network
Web-Harvest Project Home Page
Linux.com :: Automatically process new files with fsniper
Varnish - Trac
Transparent Democracy : Ballots
Altiris in an @mosphere
UNIX Secure Erase
ediscoveryinfo
rootkit.com: sonar
ExpressMaint - Home
The NTLM Authentication Protocol and Security Support Provider
AKB 2017: How to use Notification Server with IIS lockdown and URLScan
Altiris info
Maltego » Home
SweepRAM | Computers are fun, right?
ecobee - Programmable Thermostats and Other Green Living Products - Home
An FM Stereo Broadcaster
YaketyStats - Start - Redmine
Manpage of Esar
cobbler - Trac
Dark as Light | Projects/sam
DomainCheck
ACCORD5 | We make awesome stuff for the web
Explore the British Library here
Engrish.com
((MX))
SNMP4tPC - The Getif SNMP Utility
GSX Groupware Solutions Home Page
SRP: Safety Connection
Welcome to Dataoutages.com
DataOutages.com - Blackberry & Carrier Service Outage Information Center
CodeIdol - Thinking about BlackBerry - BES Administration - 74. Test Your SRP Co...
PrintWhatYouLike.com {beta}: Save money and the environment printing only what y...
Cisco CCIE Blog For Internetwork Professionals
Rands In Repose: The Culture Chart
The Parable of the Two Programmers
FastDup - Overview - Dereferenced
wissel.net :: The multi-faced nature of the NSF
Time Tracking Software - actiTIME - Web Based Timesheet
Midnight Research Labs - Depant your network
Twinfluence - Twitter Influence Analyzer
OpenCA Research Labs - OpenCA PKI (v0.9) Project
Mobile Tech Addicts
Install and Configure SQL Server 2008 Express | Symantec Juice
uDig GIS: A First Look | Linux Journal
News lpn
News
Nagios Notify
rthdribl - Real-Time High Dynamic Range Image-Based Lighting 1.2 -
OCCT - OverClock Checking Tool
MSFN - Where People Go To Know
Crystal Reports Book Blog
the complex litigator: e-DISCOVERY: New e-discovery blog offers resources for e-...
Electronic Discovery
piggydb - DevjaVu
POS (Point of Sale) Software from Volanté POS Systems
Linux TuxCards - A notebook for tuxfreaks
Common tips and tricks from a SQL Developer Support perspective : TCP connection...
A guide and tutorial on using ComboFix
BooZet Freeware » Products » Double Driver
Is IT training the poor relation of IT?
Macworld | iPhone Central | Six essential Apple iPhone security tips
MAPLight.org
Tellmatic - Die Newsletter Maschine - freies PHP / Mysql Newsletter Script :: Ha...
GTD-Free Home
BlogMS - Official Microsoft Team Blogs : Resource Guide to Free Microsoft Softwa...
IBM - Notes 8 Preferences settings storage
Making Notes 8.x (including 8.5 beta) in Eclipse feel much faster. (Andrew"s Blo...
Inno Setup
The Tax Foundation - Educating Taxpayers Since 1937
ucsniff
Leading Geeks
JD Supra | Legal Documents, Legal Forms, Court Filings, Articles & Research by t...
ILTA
Bootchart
Lifehacker Top 10: Top 10 Obscure Google Search Tricks
ProjectPier.org
Coding Horror: VNC vs. Remote Desktop
Best practices for using Lotus Notes 8 - Nitix Knowledgebase
Lotus Notes
Lotus Notes: Lotus Notes Replication - Tips
Developers: Legal Tips for Young Players - Record Keeping « Brendan Scott’s Webl...
C H A P T E R 9 - Troubleshooting the Linux PXE Boot Installation
YouTube - Warriors of The .Net
PowerGUI.org - Open Source Windows Powershell Community : WSUS 3.0
SQL Monitor | Symantec Juice
Testing SIP Security on a Budget, Part 1
Ride The Lightning: HE’S BAAACK! MITNICK DETAINED BY FEDS
xpy » About
Vispa
Safarp
CodeProject: NtRegEdit - Native Registry Editor. Free source code and programmin...
Professionalism » Viral Video Wannabe
VoIP (Voice Over IP) Tools | iSEC Partners
Hacking Exposed VoIP: Voice over IP Security Secrets and Solutions by David Endl...
VOIPSA : Resources : VoIP Security Tools
Rebuilding a Laptop Battery | Linux Journal
Examining the Compilation Process. Part 1. | Linux Journal
Collabtive
Index of /~wessels/squid-rrd
Law - The Public Library of Law
SAcc projects: index
SourceForge.net: SquidClamav
Webbasierte Projektzeiterfassung für Dienstleister - openTimetool: Home
Silverlight Chart
Skulker2 Home Page
atvusb-creator - Google Code
atv-bootloader - Google Code
RFC-Ignorant.org Home
Popular Ideas - Dell IdeaStorm
Security to the Core | Arbor Networks Security
Cloud computing is a trap, warns GNU founder | Technology | guardian.co.uk
The Digital Economy in Canada - Stopping Spam: Creating a Stronger, Safer Intern...
dnsscan - a fast scanner for identifying open recursive dns resolvers
Branch Office TechCenter
Postfix Stress Test with smtp-source and top - PostfixMail.com
WinInstall LE, MSI Creator and Configuration Builder
Overview — Approximatrix
FLEXlm Template and script set
Managing Your FLEXlm Licenses with Cacti and phpLicenseWatcher « Nerhood Weblog
Nerhood Weblog
Monitoring Dell Hardware with Nagios « Nerhood Weblog
Dr. BlackBerry: Two Free--and Easy--Ways to Diagnose RIM Smartphone Ailments
Phoenix Labs » PeerGuardian 2
Zapproved.com
pleasenotify.me - Simple Email Based Todo Manager
Vive la France! - World of Psychology
SourceForge.net: Squeak No Operating System
The Fuel That Fed The Subprime Meltdown
Batch Tutorial
DennisKennedy.blog Home
BillP Studios: WinPatrol 2008
IBM Software License Optimization
Delete Failed DCs from Active Directory
Crypto Resync :: Installing Squid with Active Directory Authentication
Understanding Active Directory, part 1
HOWTO: Configure Ubuntu for Active Directory Authentication - DeveloperNet
51 Essential Programs For A Freeware Only PC
Tim Myers" Web Log : Version 3.0 of Windows XP and Windows Server 2003 Guidance ...
Microsoft"s JobsBlog : Get Hired @ MSFT, Episode 1: Write a Killer Resume
SQL Server Data Platform @ MTC : A DL785 has just landed on runway 1 at the Micr...
How to use the SQLIOSim utility to simulate SQL Server activity on a disk subsys...
Shared Points for SharePoint... : Sharepoint Access Checker Web Part V1.3.0
A New Way to Manage Notes User IDs and Passwords
FDIC: The S&L Crisis: A Chrono-Bibliography
FAN: Fully Automated Nagios
dnscacheaudit
Andy"s House O" Blog: InstallShieldTuner Ver.6 and 8.0.2 Standard
5 More Elements of Composition in Photography
Hurricane Ike Flood & Wind Damage Assessment & Damage Repair Recommendations: In...
Septic Protector
VoIP Service Blog | VoIP Provider Reviews & IP Telephony News
Dealing with winmail.dat and unreadable email attachments
Ziproxy homepage
samsclass.info: Sam Bowne Class Information
Alik Levin"s : SharePoint Performance : Design, Implement, Deploy For Fast Exper...
Andy"s House O" Blog: The 8.0.2 Client Wackyness Continues, Kinda
Multiple monitors, quick tip to get missing apps on primary display
5 Elements of Composition in Photography
Jim Jozwiak--A figure of towering obscurity
Whatever Happened to ... Lotus Notes
The Cisco Learning Network: Cisco Learning Home
ohrwurm - RTP Fuzzing Tool (SIP Phones) | Darknet - The Darkside
Google Maps - Voting location info
BoxCycle - Buy and Sell Used Boxes - Help the Environment by Promoting Reuse!
SAP Network Blogs
UMIT | Homepage
GTD-Free Screenshot
Captain Oblivious :: What"s Your Perfect Job? Perfect Employer?
DNS Quick Check - DNS Report Tool, Test your DNS delegation, DNS Servers, Mail a...
not as good as dnsstuff but free
BlackBerry 101 | CrackBerry.com
Captain Oblivious
Uh Clem"s Admin World
Turn on Folder Redirection for the subfolders that receive new email messages
Welcome to SQL Server Central
SQL Server Tips, Techniques and Articles
Database Maintenance Plans and Backup File Management in SQL Server 2005
SQL Server Maintenance Plan - Keeping your database in shape
SAP Help Portal
Resource Kit for National Cyber Security Awareness Month | EDUCAUSE
Stay Safe Online. Your Cyber Security and Safety Resource Provided By The Nation...
Web Hosting Diary
Advertising or good info?
RatproxyDoc - ratproxy - Google Code - Project documentation
Distack - Trac
XMLStarlet Command Line XML Toolkit: Overview
Stubborn Tech Problem Solving: Improving Windows XP guest in VMware Player
Sara Ford"s WebLog
David Ebbo"s blog
Brad Abrams
Scott Hanselman"s Computer Zen
ScottGu"s Blog
AJAX : The Official Microsoft ASP.NET Site
The Official Microsoft ASP.NET Site
PC Assembly Language
Iczelion"s Win32 Assembly Homepage
Assembly Language
ASM Tutorial/Ready to Start!
Gavin"s Guide to 80x86 Assembly
Art of Assembly Language Programming and HLA by Randall Hyde
Maxilla: an OpenGL-based viewer for dentistry-related VRML files
Michael Stapelbergs Website: wiipdf
Swaptree – Trade books like a book swap or trade video games and swap cds or tra...
Netcraft Ltd - Internet Research, Anti-Phishing and PCI Security Services
Web hosting provider - Bluehost.com - domain hosting - PHP Hosting - cheap web h...
Microsoft SQL Server Tips & Tricks : Some useful tips when working with the Serv...
Welcome! (berrystatsadmin)
Enable Parent Paths Is Disabled by Default in IIS 6.0
LaBrea
Information Playground: RAID-5 Rising
Structue of Comcast"s Cable Modem Network
Whistle-Safe: Speak Truth to Power...
Microsoft Advanced Windows Debugging and Troubleshooting : NDIS - Part 1
Search Commands
Download details: Word 2007 Guide: Word 2003 to Word 2007 interactive command re...
Basis challenge #3: Obtaining the SAPGUI version of all computers
Make your graphical text semantic and searchable
About Opsview | opsview.org
SAP Network Blogs - Welcome to NetWeaver SAPSetup...
SAP Network Blogs - NetWeaver SAPSetup Tools and Utilities...
SAP Network Blogs - How to setup a SAP front-end software distribution landscape...
SAP Network Blogs -SAP front-end software distribution methods - An overview
SAP Network Blogs - I have a problem with my SAP software installation. How do I...
SAP Network Blogs - How can I resolve front-end software installation issues?
SAP Network Blogs - New feature: Self-installing packages...
Tripwire ConfigCheck for VMware ESX servers - VMware
VMware: VMware Security Blog
surfjack - Google Code
Free Open Source Thin Client Solution - OpenThinClient : home
Lotus Geek :: SnTT, kinda: Interesting replication problem, and I wanted to get ...
Condor Project Homepage
Translated version of http://www.archoslounge.net/La-Gen5-a-nouveau-craquee,8352...
Stanford School of Engineering
DeviceGuru » Stanford offers free CS, robotics courses
Using Logon Scripts in Pure and Mixed Active Directory Environments
How To Not Hire A Job Applicant - Datamation Blog
Not completely humor but it does tickle the funny bone
apache-scalp - Google Code
PHPIDS » Web Application Security 2.0 » Index
HiTech Recycling Ltd.recyling and safe disposal of computer equipment
Badkey Corner | Lotus Notes 8 and NOMAD installation
Scratch | Home | imagine, program, share
Linux.com :: Implement load-balancing, port forwarding, and rate-limiting with s...
Hoptoad
IBM - What"s new in Lotus Notes 8 client?
Notes Goddess - Work, Food and Life
Home | Sakura Consulting
IBM - Download SwiftFile Mail Assistant for Notes Client 8.x
Mail filing tool
Open DBDiff - Home
Performance Analysis of Logs (PAL) Tool - Home
Wordle - Beautiful Word Clouds
Adaptive Planning :: The world leader in on-demand budgeting, forecasting, and r...
Performance Tuning Notification Server | Symantec Juice
Monitoring SQL Performance for Notification Server | Symantec Juice
Tungsten Replicator
Currently has mysql planning for oracle support
PERFGURU
PERFGURU : Print Spooler Crash Troubleshooting Steps
SQL Server Express WebLog
Microsoft Advanced Windows Debugging and Troubleshooting : Red alert! My Server ...
Microsoft Advanced Windows Debugging and Troubleshooting : Basics of Debugging W...
Nick MacKechnie : My Server is hung - what do I do?
Welcome | The PC Decrapifier
TokenWorks
Talking Stocks « blog maverick
The Art of Troubleshooting
Houston news, entertainment, search and shopping | chron.com - Houston Chronicle
Home
Graphviz
Passive network tap - Hack a Day
DNS Spoofing with Ettercap (and a mention of Pharming)(Hacking Illustrated Serie...
Finding Promiscuous Sniffers and ARP Poisoners on your Network with Ettercap (Ha...
XTest - VoIP Infrastructure Security Testing Tool | Darknet - The Darkside
onesixtyone 0.3.2 - An Efficient SNMP Scanner | Darknet - The Darkside
reDuh - TCP Redirection over HTTP | Darknet - The Darkside
Text to Speech to MP3 with the freeware program DSpeech (Hacking Illustrated Ser...
Fraternal Order of Locksport
Chartgame.com - The time-lapse stock trading game
Defragmenting Indexes in SQL Server 2005
File Growth Settings for SQL Server Databases
The Geek Stuff » Bash Shell: Take Control of PS1, PS2, PS3, PS4 and PROMPT_COMMA...
x2x – Trac
PSS SQL Server Engineers : SQL Server (2000, 2005, 2008): Recovery/Rollback Taki...
Andy"s House O" Blog: SnTT-Text file registration, part deux
Domino Blog - Conduct Your Own Health Check
OptimizeImagePasteSize
Home | tikitag
cheap
The History of Phone Phreaking
ASCII by Jason Scott: The FBI File of Yipl/TAP
Sun xVM Server - Get It
Errdisable Port State Recovery on the Cisco IOS Platforms - Cisco Systems
show interfaces status | inc err
Windows Active Directory Management & Reporting Tools - index
ConfigExamples/WindowsAuthenticationNTLM - Squid Web Proxy Wiki
Workday | Workday provides on-demand HR and Financial Services www.workday.com
Simpletons guide to web server analysis
pmooney.net :: How to change all mail file owner"s access levels
worstpractices2008.pdf (application/pdf Object)
allthingsmail.pdf (application/pdf Object)
nsftools.com - The August 2008 Blog
GetServerFileList.lss
diehard.pdf (application/pdf Object)
adminblastr1topresent.pdf (application/pdf Object)
Prepare for Deployment Server Installation, Part 1 | Symantec Juice
Altiris Notification Server and Green IT | Symantec Juice
HttpWatch: Download
jWorkSheet
PostgreSQL"s Transaction Model
Linux.com :: Kernel tuning with sysctl
Domino Commands
vnStat PHP frontend
Tuning MySQL Performance with MySQLTuner | HowtoForge - Linux Howtos and Tutoria...
Build your own iSCSI SAN appliances, save money
[shell-fu:home]$
dotfiles.org | community for sharing dotfiles like .bashrc, .vimrc, and .bash_pr...
Main Page - Habari Project
MySQLTuner - MySQLTuner
PgFoundry: Ora2Pg: Project Info
phpLogCon :: a syslog data viewer for the web
spindown - Google Code
Configure TCP/IP from the Command Prompt
How to Use the Netsh.exe Tool and Command-Line Switches
Laurent’s Blog » Blog Archive » ORA-01033 and ORA-01113 errors
Laurent’s Blog » Blog Archive » Manage Windows Stored Credentials
rundll32.exe keymgr.dll, KRShowKeyMgr --Stored passwords in windows
SAP For Freshers Information
Useful SAP System Administration Transactions
SAP Transaction Codes
SAP T-Codes
SAP Transactions
Transaction Codes: SAP and Windows
Inspect My SQL - O"Reilly Ruby
How the "Net works: an introduction to peering and transit: Page 1
peering-playbook.pdf (application/pdf Object)
| SWAMP Workflow Administration and Management Platform |
http://kitty.9bis.com
The WSUS Support Team Blog
good info on what is currently happening with wsus
Microsoft SQL Server troubleshooting : SQL Server installation troubleshooting, ...
LatencyTOP
Nikola Dudar"s WebLog : Books on Project Management to start with
PSS SQL Server Engineers : SQL Server 2008 Management Tools Basic vs Complete Ex...
WMI Calls From Linux « An Irishman’s (IT) Diary
SimplePie: Super-fast, easy-to-use, RSS and Atom feed parsing in PHP.
Money Manager Ex - CodeLathe
Managing Users In Active Directory From Linux - adtool « An Irishman’s (IT) Diar...
LinuxPlanet - Tutorials - Networking 101: Understanding (and Using) ICMP - That ...
The Linux and Unix Menagerie: Lists vs. Strings: Perl List Permutations For Linu...
LinuxPlanet - Tutorials - Scripting Best Practices - Treat Your Variables Right
untitled
Finnix
Open Source Workflow & Business Process Management ( BPM ) Management Software, ...
CreditCruncher
Linux on board: Developing for the Nokia N810
TraffStats
Hurricanes
Data Center University by APC
Event ID 11165
Why did SPF cause my mail to be rejected? ✔
Lotus Notes Out of Office Agent, revisited: Part 2
Lotus Notes Out of Office Agent, revisited: Part 1
Troubleshooting agents in Notes/Domino 5 and 6
Minimizing delays in the Agent Manager
Troubleshooting agents in Notes/Domino 5 and 6
Gregg Eldred
IBM - Guide to the Notes/Domino Out of Office. Part 4: Out of Office in Domino W...
IBM - Guide to the Notes/Domino Out of Office. Part 3: Configuration of the Out ...
IBM - Guide to the Notes/Domino Out of Office. Part 2: ACL Access Level and its ...
IBM - Guide to the Notes/Domino Out of Office. Part 1: Out of Office Design and ...
IBM - How to use the Out Of Office (OOO) diagnostic tool.
VI:OPS: Clearspace: VI:OPS
View Your Mind
Thomas Nagy software pages » Semantik
Main Page - FreeMind - free mind mapping software
NoteCase note manager
Reading Native Excel Files in Perl | Linux Journal
PowerShell Team Blog : Speeding Up PowerShell Startup - Updating Update-Gac.ps1
Richard Clayton"s Home Page
CIRT.net | Suspicion Breeds Confidence
Migrating to Asterisk VoIP PBX - Part 3 | Matt G. Watson
Migrating to Asterisk VoIP PBX - Part 2 | Matt G. Watson
Migrating to Asterisk VoIP PBX - Part 1 | Matt G. Watson
SQL Server Compressed Backup
Selecting the best backup strategy for Microsoft SQL Server
Cisco Systems Networking Professionals Magazine - Packet Magazine - Cisco System...
holisticinfosec.org - Home
Techdirt: Internet Traffic Routing Around The US
There"s a famous saying by John Gilmore, that "the internet interprets censorship as damage and routes around it."
Matthew Paul Thomas » Blog Archive » Why Free Software has poor usability, and h...
User Interaction 101
Weblog: Ten Ways to Make More Humane Open Source Software
Free software UI
PSMon - Process Table Monitoring Script
OpenDMTP - The Open Device Monitoring and Tracking Protocol/Program
OpenGTS - The Open GPS Tracking System
Handyman Connection: Handyman Home Services Business by Skilled Craftsman for Ho...
A new Oracle Password cracker that runs inside the database
ExInsight - Real-time monitoring and statistics tool for Microsoft Exchange, MAP...
Welcome to bluebear.
Best Practices Resource Center for SharePoint Server 2007
Aaron Stebner"s WebLog : .NET Framework Cleanup Tool User"s Guide
Penning my thoughts... : Troubleshooting TS Gateway connectivity on Windows 2008...
cx_Freeze
Steve.org.uk: The chronicle Blog Compiler
PhonoRipper
http://openmicroblogger.org/
GNU Virtual Private Ethernet - Summary [Savannah]
DVDStyler - Home
TCExam :: CBA - Computer-Based Assessment
Apt-Cacher NG transfer statistics
sqlmap: a SQL injection tool
Netdude
Combining Maslow’s Hierarchy of Needs & Personal Finance » My Money Blog
Rightmark
Macsimum News - 35 places to download free and legal Mp3s
TaoSecurity: Splunk on Ubuntu 8.04
WikiGenes - Evolutionary Knowledge
Everything You Wanted to Know About Exchange (User, AeXExchPls.exe) Inventory, a...
SetACL - Windows permission management
Grism - an open source stock market observation tool
Linux.com :: Track your investments with Grism
HOWTO: Managing Active Directory users under Linux with adtool « The eternal fig...
adtool Active Directory Utility
Box Backup
Network-Attached Storage With FreeNAS | HowtoForge - Linux Howtos and Tutorials
WSO2 Identity Solution | WSO2 Oxygen Tank
overview [LBackup]
Open Source Time Tracking (not only) For Designers: Kimai
BWFreak
sap » home
SAP GUI 7.10 on Citrix Presentation Server - Application Delivery Infrastructure
something about SAP
Javanotes 5.0.2 -- Title Page
Microsoft SharePoint Team Blog : SharePoint Administration Toolkit 2.0 is Now Av...
Generation X, Y, & ME in Your Law Firm (from ILTA) | Knowledge Management « Lawy...
DataPortability.org - Share and remix data using open standards
Stanford Center for Internet and Society
IEBlog : IE8 Performance
Nick MacKechnie : Office Communications Server 2007 Best Practices Analyzer
pmooney.net :: The funniest Lotus story I have heard in years
IdoNotes (and sleep)
IdoNotes (and sleep) - Technotes for 8.0.2 - yes they are here already
ILTA KM 4: Wikis in Law Firms « The Law Firm Intranet
Project Management Anatomy - Standards, Roles, Responsibilities and Skills (from...
4sysops - Does server virtualization reduce costs? Part III - Software and payro...
IntelliScanner - Organize Everything
How to Save Money by Starting a Fuel Oil Coop
A guide to the Grc.dat file in Symantec AntiVirus Corporate Edition version 10.x
PenguinByte.com - EZEXECUTE
Bots vs Browsers - Public Bots and User Agents Database and Commentary
Home of Sans Digital - Your One-Stop Storage Provider
renrot - Summary [Puszcza]
SmartCruddy! :: Business Intelligence Tool - Aggregation & Reporting (GPL)
ADModify.NET - Release: ADModify.NET Latest Build
Dirteam.com/ActiveDir.org Blogs
GPOGUY.COM -- The Definitive Group Policy Resource Site on the Web!
SQL Server Performance in a VMware Infrastructure 3 Environment
Magic SysRq key - Wikipedia, the free encyclopedia
wissel.net :: How much bandwidth does Sametime need?
The Geek Stuff » 9 Tips to Use Apachectl and Httpd like a Power User
IBM Research | IBM Technical Journals | IBM Systems Journal
Power Outages
outages Info Page
Riverbed Technology -
Riverbed Support Policies
Riverbed Support: KB - SSL Certificate Expiration Results in Degraded State
* For all customers: Remove the expiring certificate. In 5.0 and later, go to Configure > Optimization > General SSL Settings, select the expiring certificate, and click Remove Selected. In 4.x, go to Setup > Optimization Service > Protocol SSL > Certificate Authorities. Select the expiring certificate and click Remove. Note: Removing an expiring certificate may affect current SSL optimization if you are reliant on CA verification for an existing SSL optimization configuration. To confirm this, examine the CA chain for your SSL server certificates and verify that the expiring certificate has not signed any SSL server certificates. From the CLI, you can remove the expiring certificate with these commands: > enable # conf t (config) # no protocol ssl ca name_of_certificate (config) # write mem
5 Things Delegates Should Do In Denver : NPR
Global Neighbourhoods: 7 Tips for new Twitter Users
Ask the Directory Services Team
About Vamps
K9Copy - a Linux DVD shrink
SOLARCYCLE 24.com / Solar Cycle 24 / Spaceweather / Amateur Radio VHF Aurora Web...
totse.com | A Field Guide to Critical Thinking
4sysops - Does server virtualization reduce costs? Part II - Power savings
PDF Split and Merge
Troubleshooting DNS | Daily Cup of Tech
NetApp - The Missing Shade of Blue: Ray Day Pay
The Backup Blog: Deduplication Calculator
Blocks and Files: Blocks and Files
Interesting listing
The Backup Blog
The Backup Blog: Avamar 101 Continued
Storage at OpenSolaris.org
CubitPOS - Point of Sale
Ecasound - multitrack audio processing tool
Chris Linfoot | The return of the mass mailing worm, and why you no longer need ...
Windows Installer Cleanup Utility - Description
PBX-E911.COM - Your complete source for PBX E-911 information
Riverbed Support: KB - SMB signing FAQ
Get tough on telecommuting: 6 questions to ask before you say yes
Internal Threat Encyclopedia
Goto 100 - Development with Visual Basic : Visual Basic and .NET Framework Versi...
another good relationship between .NET and Visual Basic
sipcalc
» Tools frameloss - MyNmap
Nick MacKechnie : Structured Active Directory Schema Management at Microsoft
Java run-time monitoring, Part 2: Postcompilation instrumentation and performanc...
Music Education With Linux Sound Tools, Redux | Linux Journal
Backup SQL Server Databases
Hacking a commercial airport WLAN » Debuggable Ltd
Errata Security - Know for Sure
SiLK
NfSen
PSYCHE
http://voiper.sourceforge.net/
squirtle - Google Code
dradis - Effective Information Sharing for Security Testers
Grendel-Scan
The Web and Microsoft : Microsoft Web Deployment Tool
SharePoint Hosting and Development : Improving SharePoint with SQL Server 2008
projects:check_generic:start [my-plugin.de]
SourceForge.net: bemDB
4sysops - Does server virtualization reduce costs? Part I - hardware expenses
Beholder WIDS Tool
Audio and music videos - 440TV Videos
FCC Search Tools
Radio-Locator
Radio-Locator
How to Remove the iPhone SIM Card | Mac|Life
Securing Mac OS X Leopard (10.5)
delizzy - del.icio.us Bookmarks Search Engine
Wi-Fi tweaks for speed freaks
Data security: What the law requires of IT
KDDI glitch sent e-mail for Japan consulate in H.K. to 3rd parties+
Notes from a dark corner : Uninstalling .NET Framework 3.5 SP1
finally a beautiful visual representation of .Net versions/Service packs
Citrix Visio Stencils for your Datacenter : VMblog.com - Virtualization Technolo...
Elgg.org
constat
How To: Rotate Desktop Backgrounds in Ubuntu
How to get system info in Linux « a non-geek’s linux notes
LinuxPlanet - Tutorials - OpenOffice.org Tips and Tricks Part II - Importing MS ...
ExpenseServices.com
update4U - update4u Software AG (EN)
StorageMojo » StorageMojo.com’s Price Lists
OpenVAS - OpenVAS - Open Vulnerability Assessment System Community Site
EnergyHub Home
Derek Callaway"s Personal Home Page - porkbind
SecuriTeam™ - Multiple Cisco IOS Shellcodes
rootkit.com
Operations Manager Product Team Blog : EventLog Explorer
Architects Rule! : SaaS Maturity Model according to Forrester
Data Dude : Diagnosing Problems
Chris Gray"s blog : ...finding an NTFS volume after accidentally deleting all yo...
Serio IT Service Desk Resources Blog » Top 10 Tips for Surviving a Merger or Tak...
SourceForge.net: nagstamon Nagios status monitor
Main Page - PDune
From Caitlin: "Dad, are the Olympic medals solid gold?" The answer is interestin...
Lotus Sametime Unyte :: Desktop sharing for Skype users and everybody else. Be t...
TOM BIHN Designs - Laptop Bags, Laptop Backpacks, and Laptop Cases
decodeunicode.org . Last Entries
You may experience performance problems when you are working with items in a lar...
How to find duplicate rows with SQL - Xaprb
Anti-Malware Toolkit 1.03.125
Pics and Kicks
Atheros_Regulatory_whitepaper.pdf (application/pdf Object)
A resource for activists using mobile technology worldwide. | MobileActive.org
http://www.miracleas.com/BAARF/
LinuxPlanet - Tutorials - Linux RAID Smackdown: Crush RAID 5 with RAID 10 - Linu...
checkmysap - Google Code
Nintendo Wii - Add DVD support
SteelBlue Open Source Web Application Server
Mindquarry DO - Free Open Source Software Download for Team Collaboration | Mind...
Free web statistics, phpMyVisites web analytics
LimeSurvey.org - The Leading Open Source Survey Tool
Freeway: Home
The Iphone Mine
DominoPower Magazine
Time Machine (INET, Fak. IV)
Sourceforge - ClamSAP
FreeNAC| Take control of your LAN with FreeNAC!
raWPacket » HeX
IBM - What is the difference between Notes.exe and Nlnotes.exe?
CO2Stats - Making websites green
Best practices for large Lotus Notes mail files
A First Ever Look Inside The Defcon Network Operations Center | Threat Level fro...
BlackBerry Freeware Directory | Best and Free Software for RIM BlackBerry Smartp...
Alfresco - Open Source Enterprise Content Management (CMS) including Web Content...
Home - Hampton Roads SQL Server User Group
Ben’s Drivel » Activate Verizon DSL in Linux.
Geek Dinner v0.6 | Louisville, KY | January 26th 2009
J.D. Meier"s Blog : 10 Success Patterns for PMs
The Geek Stuff » 15 Examples To Master Linux Command Line History
LMbench - Tools for Performance Analysis
Phil Dykstra"s nuttcp quick start guide
Image Size For PowerPoint
Über Gööber - Powered by vBulletin
Oncore Power Systems | Notebook Batteries | Chargers | Networking Products
Deltasql - GPU
Beware of the Dog | JoeDog / Siege
http_load
Linux.com :: Stress testing an application with JMeter
Pylot | Open Source Web Performance Tool
Welcome to the httperf homepage
Welcome to curl-loader
Dynamic Colors in the WorkitemView Console | Symantec Juice
O"Reilly Network -- Top Ten Cisco IOS Tips
transport preferred none
Convert Dell Service Tag to Express Service Code - How To - Creativyst: Explored...
Puppet Introduction - puppet - Trac
myLife2.0
How to export your .id file from your domino directory « myLife2.0
IBM - Is It Possible to Attach a User"s ID File to Their Personal Address Book A...
IBM - Roaming User in Notes/Domino 6.0.1 (and Above): User ID Issues To Be Aware...
Nomad Multi-User Installation. : double6.net
Phigment Said What? - Useful INI settings for InstallShield Tuner
What is blist?
The DAVIX Live CD | SecViz
The Art of Software Security Assessment
Global IP Network Home
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Business Intelligence Software - Reporting Tools - BIRT Exchange
Virt-mem
Inkscape tutorial: creating a simple ribbon
Logon Script FAQ
An Illustrated Guide to the Kaminsky DNS Vulnerability
Improve Guest Server Performance Under VMware ESX Server
perihel - closer to the sun
Last Mile Gear
Troubleshooting FAQ: What command-line do I use? -- Siddhartha Rao
Mark"s Blog : Pushing the Limits of Windows: Physical Memory
Andy"s House O" Blog: SnTT - xACL - Secure that Domino Directory!
Gavin Bollard - Computing and Lotus Domino: When Hardware Leasers Try to Kill Yo...
apt-dater – terminal-based remote package update manager
Present Like Jobs
Advanced Clustering | Breakin | Software
File transfer over SSH Authentication Agent
LinuxPlanet - Tutorials - Networking 101: Subnets Realized (Including IPv6) - AR...
Java run-time monitoring, Part 1: Run-time performance and availability monitori...
DeviceGuru » Blog Archive » Tiny, 6-chip ‘open’ computer runs Linux
Altiris
BeagleBoard.org - default
Deep Capture | The Story of Deep Capture | Deep Capture Blog
not sure if this should just be a weird one
John Dixon Technology - Earnings Tracker - Overview
Main Page - Pentabarf
F*EX - File EXchange
open Bmap
Windows XP: Slipstream Service Pack 3 into Your Windows XP Installation CD
WinUpdatesList - View Windows Updates (Service Packs and Hotfixes)
SAP Network Blogs
Tools | Insomnia Security, Auckland New Zealand | PuttyHijack
Lemur CATTA
StartSSL™ Certificates & Public Key Infrastructure
Group Policy Team Blog
SAP - Business Software Solutions Applications and Services, SAP MM, SAP SD, SAP...
SAP Basis Notes
Cain RDP (Remote Desktop Protocol) Sniffer Parser
MadMACs: MAC Address Spoofing And Host Name Randomizing App For Windows
Dsc: A DNS Statistics Collector
SQL Profiler best practices
SourceForge.net: Reverse Snowflake Joins
SafeNet Inc: The Foundation of Information Security
3 - Preventing IE Proxy Changes
Union of Concerned Scientists
ChangeDetection - Know when any web page chages
Versionista.com: Track changes to any Web site
Site Check: Website Test – UITest.com
IE NetRenderer - Browser Compatibility Check -
BerryStats and Useful tools for BlackBerry Administrators
Gargoyle Router Management Utility
Curious Inventor - HowTo Guides, Tools, Parts and Kits for DIY"ers - Make your o...
Curious Inventor - Guides : How to Solder
Deogen - Tiny monitor tester
SAP BASIS ADMINISTRATION: SAP Router Connectivity
SAP R/3 Basis        
SAP Training, SAP Jobs, SAP Help, SAP FAQ, SAP Modules, SAP Tutorials, Questions...
SAP ABAP/4 Programming, Basis Administration, Configuration Hints and Tips
Speex: a free codec for free speech
Quantum Bits
j o n a s . p h | Saprouter: Timeout
757 Labs - PDFResurrect - PDF Analysis and Scrubbing Utility
ProxyCfg.exe, a Proxy Configuration Tool (Windows)
Calizo - Timeline calendar with zoom
757 Labs
Microsoft Active Directory Topology Diagrammer
Lynch Consulting Blog: Pretty network diagrams and flow charts with Open Source ...
Telecom Expense Management, TeleBright Software Corporation
Saving Electricity: How to Save Electricity
Welcome to GreenNow USA
Sungevity solar systems can work for your home
Inventor"s Handbook
Open Innovation | Innovation Management
Group Health Insurance
Find The Best Cell Phone Plan For You | BillShrink
BizBuySell - The Internet"s Largest Business for Sale Marketplace
DShield; Cooperative Network Security Community - Internet Security Highly Predi...
DShield; Cooperative Network Security Community - Internet Security - dshield
Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen...
SourceForge.net: Files
btCrawler - Bluetooth Diagnostic Tool
SourceForge.net: BlueScanner
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Switzerland Network Testing Tool | Electronic Frontier Foundation
Large Hadron Collider nearly ready - The Big Picture - Boston.com
Microsoft SQL Server 2005 Driver for PHP - Home
Aaron Stebner"s WebLog : How to uninstall the components of the .NET Framework 3...
Nick MacKechnie : SQL Server 2008 Training Opportunities
while (alive) { writeCode(); } : Dispelling SharePoint Myths
A Declaration for Independence - Lawrence Lessig
blambi"s page /software/bost/
syren - Trac
fotoxx - kornelix
Henning Mersch
UNIX tips: Learn 10 good UNIX usage habits
Circuit Bending Documentary
10 Ultimate Rules for Effective System Administration
Cornell Notetaking Method Custom PDF Generator
Orwell Diaries «
FOSSWIN - open source software for Windows
Information Security Forum
Ahead of the Curve | Tom Yager | InfoWorld | Your server is wasting your CPU | J...
The performance envelope of a CPU and chipset is cast in silicon, but sculpted in software.
NGDC : Conference & Expo
It"s Spann, not spam : SharePoint SP1 Sandbox Using Windows Server 2008 (part 4)
It"s Spann, not spam : SharePoint SP1 Sandbox Using Windows Server 2008 (part 3)
It"s Spann, not spam : SharePoint SP1 Sandbox Using Windows Server 2008 (part 2)
It"s Spann, not spam : SharePoint SP1 Sandbox Using Windows Server 2008 (part 1)
Knol: a unit of knowledge
United States Secret Service: Best Practices for Siezing Electronic Evidence
DoxPara Research
Sanjiv Jivan"s Blog
Gavin Bollard - Computing and Lotus Domino: Moving a Domino Server onto New Hard...
Gavin Bollard - Computing and Lotus Domino: Moving a Domino Server onto New Hard...
Gavin Bollard - Computing and Lotus Domino: Fun with Blackberries - Moving Serve...
wissel.net :: Explaining the human condition to an eight year old
Musings from a code poet: Disaster Recovery: Knowing what you know
Musings from a code poet: we had a fire at work
IBM Podcast: Notes 8 Migration Success Strategies
TinyNews
Good for outage publication by an IT group?
So You Need to Virtualize a MS-SQL Database Application? But Where Are The Gotch...
Collection NS Database Structure | Symantec Juice
Download Information
IT Power for small business and mid-sized business | bMighty.com
Know Your Stuff Home Inventory Software
Search Engine Land: Must Read News About Search Marketing & Search Engines
Missing Money Free Search for Unclaimed Property - Officially endorsed By The St...
read sendmail entries in the system log - Linux Cluster - Planet Larg
Welcome to coreboot - coreboot
AnySQL.net English -- What"s AUL/MyDUL
KCCoder.com - DBTree (Java Database Tool) - Release 0.8.7
ORA600 | Never a DUL moment with DUDE
Lotus Domino Administrator 8 Help - Setting up client installation and installat...
Lotus Domino Administrator 8 Help - Installing Lotus Notes in a multi-user envir...
Lotus Domino Administrator 8 Help - Considerations before installing Lotus Notes...
Lotus Domino Administrator 8 Help - Automating client installation using a silen...
Lotus Domino Administrator 8 Help - Customizing Notes installation using the ins...
Scripting for Lawyers
Cuil
How to Take Portraits - 19 Portrait Photography Tutorials
Data Center Knowledge: Data centers, design, power, cooling
OpenOffice.org repository for Extensions | Welcome to the home of OpenOffice.org...
GSM Roaming in Japan (and Everywhere Else)
japan-guide.com - Japan Travel and Living Guide
IMSpector - Instant Messenger Proxy Service - IMSpector
Xataface | The fastest way to build a front-end for your Database
thaweekan.com » Service Request Form Template
A Handy Formatting Trick with the Service Request Form Utility | Symantec Juice
Cleaning up the Helpdesk Database | Symantec Juice
Clear-Site.net | Home Page
Xinn.org | Security and Sanity Solutions!
http://www.networkworld.com/chat/archive/2008/072308-snyder-stiennon-nac-debate....
.:: CORE SECURITY TECHNOLOGIES ::.
CANARIE Inc.
CANARIE Network - Library (Customer Owned Dark Fibre)
Brendan Gregg : Weblog
SP800-55-rev1.pdf (application/pdf Object)
..:.:.:: H O G ::.:.:..
Belarc NIST Advisor - Free Personal PC Audit
nUbuntu - Network Ubuntu
System Administrator Appreciation Day
citizen engineer
THOMAS (Library of Congress)
GovTrack.us: Tracking the U.S. Congress
Snare EventLog Agent for Windows - Event Log transfer to Snare & Syslog servers ...
Basics for Securing Terminal Service Environment | Symantec Juice
Auto Project Planner
Magento - Home - Open Source eCommerce Evolved
Windows Wget files
APC UPS Battery Replacement & Upgrade Selector
constat
SupportIncidentTracker: HomePage
Md5Copy - David Mohr"s Homepage - Trac
ClearHealth Inc. - Home
webcheck: website checker
freshmeat.net: Project details for sqlDoInstall
the cluetrain manifesto
Satellite Forum FAQ - dslreports.com
Komodo Laboratories - NEWT® Professional - Download
Komodo Laboratories - NEWT® Freeware
InternetNews Realtime IT News - JUNOS: Open, but Not Open Source
SharePoint Magazine
International SharePoint Professionals Association
Jim Lamb : Best Practices for Shared Virtual Machines
Terry Zink"s Anti-spam Blog : The problem of backscatter, part 14 - Bounce Addre...
MyCat - Home
WikiScanner: List anonymous wikipedia edits from interesting organizations
wolfchild.de
Money Flows: Market & Sector Overview - Markets Data Center - WSJ.com
DBTAC: Mid-Atlantic ADA Center - Welcome to ADAinfo.org
FileCheckMD5 - Free MD5 file check utility for Windows.
DNSstuff: DNS tools, DNS hosting tests, WHOIS, traceroute, ping, and other netwo...
Bill Gates: Looking Back, Moving Ahead
AudioScience - ASI8914
JiWire Wi-Fi Advertising Network, Wi-Fi Finder and Hotspot Directory
VoIP Watch: The Tools of The Global Nomad
Press pack "Texting without borders" - Europe"s Information Society Newsroom
Google Docs Templates
Trisul : Open source network metering and forensics [Trisul]
www.japaninc.com | Japan -- Business People Technology
Consumer Action Handbook - ConsumerAction.gov Main Page
Notification Server Licensing -- Tips From a Customer | Symantec Juice
Mobile Network Speed Testing Solutions | iNetwork Test
Network UPS Tools (NUT) on Ubuntu « Keystone IT Tech
Exile
Replicator
VendorRate - Find a Vendor
SourceForge.net: Firewall Rulebase Audit Automation
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
autonomo.us
Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen...
Ceph | open source distributed storage
Lotus Notes users: your weekly review just got easier... with eProductivity
Labels in an instant with autofillPDF-Labels 1.0
about Scriblio » About Scriblio
RTFM Education » RTFM Guides
Eric Wendelin
grep is a beautiful tool
Solved: TrueVector driver: Driver install or load failure - Tech Support Guy For...
Fixing mouse drift on a Dell Latitude C600 with a Sledgehammer | gimboland
SliTaz GNU/Linux - Home page
Cyberience Project Manager
Club Troppo » Shared Hosting is Doomed (and I have the graphs to prove it)
Uperf - A network performance tool
DNS Quick Check - Online DNS Report Tool - Enter the domain to test realtime, Te...
How Is My DNS?© - Sponsored by Nixu Software©
Domain - reports and all about ips, networks and dns
intoDNS: checks DNS and mail servers health
YSlow for Firebug
Last In - First Out: Ad-Hoc Verses Structured System Management
Data Center Links
Last In - First Out
GLPI - Gestionnaire libre de parc informatique
Standalone Sysadmin: HOWTO: Order a T1
O"Reilly -- Upgrading to BIND 9: The Top Nine Gotchas
DenyHosts Statistical Summary
Automatically Report all SSH Brute Force Attacks to ISPs - Panther Software
Free Tools
Hilltop Lab
ActiveDir.org Home
The Inside Active Directory book
PktAnon - Packet trace anonymization
MokaFive, Virtual Desktops for Businesses and Personal Use
Practical Ideas for Your Home - Workbench Magazine
http://doxpara.com/
Podcasting with Linux Command Line Tools and Audacity
check_oracle_health
OpenID
OpenIDFarm Index
dnsenum - Google Code
Getting the most out of your Apple TV by hacking it :: Hack In The Box :: Keepin...
Zimbra offers Open Source email server software and shared calendar for Linux an...
Internet Mail Consortium
attrition.org
Saving the Net: How to Keep the Carriers from Flushing the Net Down the Tubes
Saving the Net
Saving the Net III: Understanding its Frames | Linux Journal
New Networks / New Services
Active Directory Change Reporter (Freeware and Commercial) - NetWrix Corporation
High Performance Wi-Fi - Xirrus
Internet Topology
Route Views Project Page
LinkRank Visualization
Training Tips for New Linux Users | Works With U
Three Rules of Public Speaking « A Fool and his Words are Soon Parted
NginxGettingStarted - Nginx Wiki
The C10K problem
Download details: Windows Server 2008 Component Posters
SQL Server jobs on production instances
Contactify: It"s email. Without the address.
Dan Lynch"s Blog
Linux.com :: A case for text-based DVD rippers
Add an Auto-Incrementing Build-Number to Your Build Process | Linux Journal
NS 6 Database – Everything You Wanted to Know and Probably More | Symantec Juice
jimtsay - MySysprep
Helpdesk when Helpdesk wasn"t Cool
Andrew Fryer"s Blog : Virtualized SQL Server
WindowsDevCenter.com -- Windows Server Hacks: Restoring Shadow Copies Using the ...
Larry Osterman"s WebLog : Why is the DOS path character "\"?
Bob Plankers, The Lone Sysadmin
Standalone Sysadmin
How to install and run KDE programs in Windows - Simple Help
cool
eComStation :: an OEM Upgrade to IBM OS/2. Right for today"s PC hardware
Main Page - Network Naming Schemes
Electronic Crime Scene Investigation: A Guide for First Responders, Second Editi...
The Center for Password Sanity - exploring realistic site security policies that...
Microsoft SQL Server: SQL Server 2005 Features Comparison
Simple SQL Backup Version
SQL Injection Cheat Sheet
scord
Microsoft SQL Server Support Blog
MSDN Code Gallery - Home
Download details: Microsoft Assessment and Planning
Index of Compute! Magazine Issues
ESXGuide
NetDirector.org - Home
Sprog!
Down for everyone or just me?
Home automation in GNU/Linux
Solid Signal | Digital Converter Boxes, DIRECTV® Systems, HDTV Antennas, DISH Ne...
Download Scrawlr: The SQL Injection Detection Tool
Davis | Automotive | CarChip Products
Third Hand++: A multi-use helping hand for electronics and other delicate work. ...
Laptoping.com - Notebooks, Tablets, UMPCs, Laptop-Like Devices - News, Reviews, ...
Context Free Art
IBM Redbooks | IBM Lotus Notes and Domino 8 Deployment Guide
IBM - Upgrade Central: Planning your upgrade to Lotus Notes / Domino 8.0
Lotus Notes and Domino wiki
Group Policy Resource Center : GPanswers.com
The Secret to Ultra-Sharp Photos
Wordle - Create
Fast and inexpensive iPod Repair, Screens, Batteries, and Free Diagnostic Testin...
Home | ComboValidation
IBM - Quick guide to securing a Domino server with SSL using the CA process
PDF Editor
Davis | Automotive | CarChip Exclusions
Web 2.0 - Everything 2.0 - Big Alphabetical List of Nearly Everything Web 2.0
WWW.STROCAMP.NET
Linux.com :: Expert tip: Print booklets in Scribus
the electric sheep screen-saver
cosmic recursive fractal flames
Bandwidth: a memory bandwidth benchmark
GetHT - A Hinduism Today downloader for GNU/Linux
www.packetfence.org: Home
Human Resource Management Software - OrangeHRM
stats:intro [OpenVISP]
freshmeat.net: Project details for sqlDoInstall
AA B05-Altiris Architecture Overview.pdf (application/pdf Object)
The Lazy Admin
Spam Resource
Visible Ops Blog
Download details: DTCPing.exe
Home ( DNN 2.1.2 )
Detecting SSH tunnels « coderrr
SourceForge.net: SSHgate tunneling daemon
Beeswax - Mind Your Own Beeswax
Time Tracking
SourceForge.net: Free-SA
Main - WebHome - Multi Projectmanagement
Increase Notification Server Performance by Regularly Deleting Temporary and Log...
Tim’s Home Page » portreserve
Hypertext Style: Cool URIs don"t change.
The Long Tailpipe - Shai Agassi"s Blog
You see that is what leadership is all about - you inspire your people to do something bigger than themselves, and then you do everything in your power to help them achieve their goal.
OpenPegasus
8 Free Online Resources For Learning A New Language | The Best Article Every day
The 30 skills every IT person should have | InfoWorld | News | June 02, 2008 | B...
FREE Online Safe Deposit Box(sm) from Keep You Safe and KeepYouSafe.Com
Steganos LockNote: Overview - Steganos GmbH
HRhero.com: Employment Law Resources for HR Managers
Glenn"s Underground Cabin Update
SourceForge.net: KeePassSync
dominoorexchange
Linux.com :: How to save time and traffic upgrading with apt-proxy
packetmischief: Network Monitoring - BIND 9
Sorting it all Out : Font substitution and linking #2
Sorting it all Out : Font substitution and linking #3
Sorting it all Out : Font substitution and linking #1
Faxing tips for fax servers, fax broadcasting and home faxing
Home - MVP: Mike Walsh
SSMSE, Using Views, and SQL Server Express Blog
Slashdot | When Is a Self-Signed SSL Certificate Acceptable?
Computerworld - The A-Z of Programming Languages: C++
Linux.com :: How to scan and OCR like a pro with open source tools
How to Reduce Camera Shake - 6 Techniques
Legal Technology - How IT Is Transforming Legal Services
Policyd v2
Microsoft Windows Server Update Services Tools and Utilities
Shiptool, every carrier for every user
Welcome to Call2Recycle
Norm"s PerformancePoint Server Blog : Managers decide they want BI
IBM - Notes/Domino Best Practices: Master Checklist
IBM - Support information for RIM"s Blackberry Server (BES) for Notes/Domino 8
All about AdminP Part 2
Lotus Domino Administrator 6.5 Help - Administration process requests
Lotus Domino Administrator 6.5 Help - The Administration Process
IBM - Frequently Asked Questions - The Administration Process (AdminP)
wissel.net :: Securing your CxO"s mail file
Single Sign-On Solutions in a Mixed Computing Environment
Applying the Fishbone diagram and Pareto Principle to Domino
Applying the Fishbone diagram and Pareto principle to Domino
Syslog - Main - Syslog Home
Eventlog to Syslog Service - Engineering Computer Network, Purdue University
Andy"s House O" Blog: ND8 Upgrade Step 1 - Upgrade the design of the Domino Dire...
Download Free PDF Unlocker - Techtrends
LexMonitor : Law Blogs - Legal Blogs : Prominent Discussion & Lawyer Participant...
Browser Security Test
[INFOCON] NIST SP 800-42, Guideline on Network Security Testing
ISSAF Overview Page - Open Information Systems Security Group
ISECOM - Making Sense of Security
The Best-ever Freeware Utilities List | Gizmo"s Tech Support Alert
JkDefrag v3.34
Open-source Forensics Tools for Network and System Administrators
Find_SSNs - A program that searches files for U.S. Social Security Numbers.
Senf - Trac
Technitium FREE MAC Address Changer v5 Released | Darknet - The Darkside
Your Money - A Primer for Young People Starting Their First Job - NYTimes.com
ConVirt - OpenSource Virtualization Management
now does KVM as well
Welcome to EPEAT
Application Availability
Virtual Geek
VI Client Open Console Attempt Fails | VM /ETC
“error connecting: can not connect to host x.x.x.x: a connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.”
WWoIT - Wayne"s World of IT
CmB IT
Mail merge in OpenOffice.org
Automation for the people: Pushbutton documentation
DecaffeinatID: A Very Simple IDS / Log Watching App / ARPWatch For Windows
How to uninstall the Adobe Flash Player plug-in and ActiveX control
Version test for Adobe Flash Player
Main Page - Altiris Wiki
Altirigos
clive - download tool for youtube and other video hosts
ext3undel - Trac
IP Bandwidth Watchdog
Yellow Bricks
Some Dell computers cannot start in normal mode after installing Symantec AntiVi...
Nonprofit Operations Manual Template | Aspiration
NDEmag.com HOME - ISSUES - NEWS - BLOG - CONTACT
blackbag
Open eGov — City of Newport News
OpenProj | Projity Open Source and Hosted Project Management Software
.::ArpON::.
Working Productively in Bash’s Vi Command Line Editing Mode (with Cheat Sheet) -...
TrendSecure | Trend Micro™ RUBotted (Beta)
Macrium Reflect FREE Edition - Information and download
SELF | Sharing Knowledge about Free Software
Augeas — Main
Installing Oracle XE on Debian
Pbx Info
VMware Infrastructure (VI) Toolkit (for Windows) Release Notes
PowerShell Commands for Active Directory by Quest Software
PowerGUI.org - Open Source Windows Powershell Community : Main
SnapLogic Open Source Data Integration
Troubleshooting Performance Problems in SQL Server 2005
Marco Pontello"s Home - Software - TrID
TrID is an utility designed to identify file types from their binary signatures.
4sysops - SolarWinds Exchange Monitor
virtualization.info Industry Radar: Your virtualization industry tracking system
IBM - Understanding the Full Access Administrator Feature in Domino Release 6
HotPads.com - Search for Real Estate, Homes for Sale, Apartments for Rent, Renta...
ATOP System & Process Monitor
ChironFS - A filesystem must go on, even if it is hurt
Callbutton :: Click-to-Call, SMART Toll Free Numbers, SMS Text Messaging
The Breach Blog
VMmark Virtualization Benchmarks - VMware
Ian Palangio"s Business Productivity : Office 2007 Deployment Resources for End ...
Harvard Business Online"s Susan Cramm
Valuedance - Home
More of a company/group?
Search Engine Optimization & Web Hosting Solution
iPhone Alley
To do list, simple, easy, fast, sharable: Ta-da List
VBinDiff - Visual Binary Diff
North-by-South : Software development by open source programmers in San Francisc...
Main Page - IOS Crash Analysis and Rootkit Wiki
Server-based License File Checker - VMware
Windows Vista cannot obtain an IP address from certain routers or from certain n...
Welcome to VTE
Plant Maintenance Resource Center - Industrial Maintenance information source
Flexcrypt: Automatic Email Encryption and Decryption
Log Tools | Russell Coker"s Documents
QNAP Systems, Inc.- NAS storage and Surveillance products provider
Tech_ReviewCisco Networks Routers Switches Tim Hogan
GNU Zebra -- routing software
Office of Computing and Communications Services
Documents @ Made IT
All about AdminP Part 2
All about AdminP Part 1
A Solaris Administrator Looks at OpenSolaris
Data Retention Effectively Changes the Behavior of Citizens in Germany « Creatio...
Vatata : next-generation advanced p2p streaming system <<
Amahi Linux Home Server
pdfrecycle
Home Inspector - InterNACHI: home inspection/inspector
goosh.org - the unofficial google shell.
sinfo - a monitoring tool for networked computers
MisterHouse
http://www.thenorth.com/
Interview: Howard Chu, OpenLDAP chief architect - Blogs – ComputerworldUK blogs ...
keyTouch
IBM - What information replicates to the roamed Notes Client from the roaming se...
IBM - How to set up local databases to replicate for Roaming users
Raiden"s Realm: Remote Backups for Linux and BSD
Sysprof - A System-wide Linux Profiler
Doing a Reverse Hex Dump | Linux Journal
How to be a good (and lazy) System Administrator | Linux Journal
Troubleshooting agents in Notes/Domino 5 and 6
tell amgr cancel "database name" "agent name"
nsftools.com - Tools, Tips, and a Weblog about Lotus Notes, Domino, and Java
User Administration Utility
Lotus Notes Ninjas
LotusUserGroup.org Group Blog | Get rid of those CD to MIME Conversion entries i...
THC-AMAP - fast and reliable application fingerprint mapper
sipflanker - Google Code
Zfone Project Home Page
Main Page - Forensics Wiki
inurl:hp/device/this.LCDispatcher - Google Search
google search for HP printers on the Internet
ImportGenius.com : U.S. Customs Database and Competitive Intelligence Tools
Getting Ubuntu Linux to connect to a PPTP Cisco VPN 3000 Concentrator
Emsa Register Dll Tool: Information and Dll Registration Tool for Windows
GUI for the commandline adverse
Main Page - WiiBrew
DriverSide | Car Help for Buying, Owning, Car Repair & Maintenance
NNMA - NNSquad Network Measurement Agent
YouTube - VMwareELearning"s Channel
Nick MacKechnie : You receive a “Stop 0x0000007E” error message after you upgrad...
Legal Technology - Technology Management Is Not for Lawyers
IT Service Desk and Helpdesk Blog
ATF-Cleaner.exe - www.atribune.org
DoubleKiller - find and remove duplicate files (Big Bang enterprises)
Legal Technology - When to Dump Stale Electronic Data
Four tips for crafting a document retention policy
Battling Botnets and Online Mobs: Estonia’s Defense Efforts during the Internet ...
gPodder: A media aggregator written in Python/GTK
freshmeat.net: Project details for check_websites
Client Software Update Status - Free Troubleshooting Tool | Altiris Juice
Best Practices for Optimizing SQL Server in SAN Environments Using Altiris Produ...
The Linux and Unix Menagerie: Simple Shell One-Liner To Enumerate File Types In ...
Peak 10 Data Center Solutions :: Web Hosting, Web Site Hosting, Managed Hosting,...
Dedicated Servers & Web Hosting | Managed Web Hosting Services | The Planet
Daily Cup of Tech » Server Failure Lesson #4: A Server Isn"t Dead Until It"s Dea...
Server Failure Lesson #2: Linux is Your Friend | Daily Cup of Tech
Server Failure Lesson #3: Purge a Dead DC | Daily Cup of Tech
Server Failure Lesson #8: Gig NICs Need AutoConfig | Daily Cup of Tech
Server Failure Lesson #7: Be Redundant, Be Redundant | Daily Cup of Tech
Server Failure Lesson #5: Server Tendrils Go Deep | Daily Cup of Tech
Server Failure Lesson #2: Linux is Your Friend | Daily Cup of Tech
Daily Cup of Tech » Server Failure Lesson #4: A Server Isn"t Dead Until It"s Dea...
Server Failure Lesson #1: Poop Happens | Daily Cup of Tech
AutoPatcher.com
Server Failure Lesson #10: Useful Active Directory Tools | Daily Cup of Tech
GreenSQL | Open Source Database Firewall Solution
How-To: Expand your camera with CHDK - Hack a Day
Federal Desktop Core Configuration : Utilities for automating Local Group Policy...
(FDCC) Federal Desktop Core Configuration software and solutions
Security: The Great Debate: Security by Obscurity
Download details: Sonar.exe: File Replication Service (FRS) Status Viewer
Download details: Active Directory Performance Testing Tool (ADTest.exe)
Active Directory
APC - Software / Firmware
Dragon Forged
InformIT: Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 1...
InformIT: Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 2...
VIA OpenBook - Home
Course Packs - Coursepacks - Course Packets - Course Readers - University Reader...
the back room tech
Proto Co Networking: Proto Balance Advanced
SecureNix.org - Louisville, KY Linux & BSD Users Group
Fiddler HTTP Debugger - A free web debugging tool
Home ( DNN 2.1.2 )
GANYMEDE: GASH2
SourceForge.net: The dnswalk DNS database debugger
Automate Creation of Active Directory User Accounts
Automate Active Directory tasks with scripts
Nicehacks
Piggy Market Squeak
msn-proxy: the msn connection control
Auto Project Planner - Introduction
research!rsc: Lessons from the Debian/OpenSSL Fiasco
Welcome - Bazaar Version Control
John W Powell : The 7 Habits of Highly Effective Developers
FreewareGeeks :: Download UltimateDefrag Freeware Edition 1.72 : UltimateDefrag ...
dirsynch: DirSynch Project Home Page
Iotop"s homepage
Security Resources
You’re Going To Be Sued! The Role of EDD IT | Complex Discovery
Royal Pingdom » Gallery of Network Operations Centers
Data Center Knowledge: Data centers, design, power, cooling
Email Security and Data Loss Prevention for the Enterprise by Proofpoint
The Secret History of Star Wars
50 Awesome Open Source Resources for Online Writers
Project: Starfighter
Glest Free RTS Open Source
The Spring Project
PSS SQL Server Engineers : How It Works: SQL Server 2005 - Possible data recover...
[How To] Multi-boot DVD Guide - MSFN Forums
Does your AMD-based computer boot after installing XP SP3? - Jesper"s Blog
MSInfluentials
Finding Promiscuous Sniffers and ARP Poisoners on your Network with Ettercap (Ha...
ASP.NET Debugging : ASP.NET Tips: What to gather to troubleshoot
Unbound
nlnetlabs.nl - Name Server Daemon (NSD)
nlnetlabs.nl - News and updates
Working Smart: The Master Task List
Phone Scoop
Sprintusers.com - The Place for Sprint Phone Reviews, Sprint Tools, and Sprint R...
Top 10 Security Settings to make directly after Installing Active Directory
SPTU - SharePoint Tools and Utilities - Home
SharePoint Inspector - Home
http://vmetc.com home page
RFME.com
What do companies of similar size pay for the same item you are purchasing?
Vision For Hire: Some parameters that I have added which have really help out an...
Rawstudio
Creating a Multi-Boot DVD - MSFN.org
GOsa - Trac
Manage everything in LDAP
EUSecWest Applied Security Conference: London, U.K.
Remotis Technologies - Home
Anatomy of a Note ID
Best practices for large Lotus Notes mail files
WoonBlog
FastNSF.com | Dedicated To Practical Domino Performance
Children"s Internet Protection Act
HOWTO: Remove mail from postfix queue based on from email or rcpto email address
Your Resume"s 4 Audiences | Advice and Opinion
Consumers CHECKBOOK
Marketing Your Business - Factsheet: Speed up Outlook 2007 - performance tips
iPhone Backups Part 2 - O"Reilly Digital Media Blog
iPhone Backups: Part 1 - O"Reilly Digital Media Blog
The OpenISES Project: Home
OpenNetAdmin/home
GrandCentral: The New Way to Use Your Phones
Rick"s Pit - Lockdown
Cash for Your Used, New, and Broken iPods, Cell Phones, Smart Phones, iPhones, G...
Intermediate Classes - Office
CompuCom Systems - Home
Grid Net | Home
inno:script - The makers of Porcupine Web Application Server - FileTrack v0.1-RC...
Luigi Auriemma
StorYBook - Summary-based software for novelists and authors.
MSLG - Multi Switch Looking Glass for PHP
daa2iso
Activist coders aim to deafen Phorm with white noise | The Register
BadPhorm - When good ISPs go bad!: Welcome
Antiphorm
Chris Sanders » WSUS Clients Not Connecting
USDA Telecommunications Program
blindhog.net » PEMU
Implementing and Managing Windows Server 2008 Clustering: Course 6423A: Three da...
wissel.net :: Culture Snippets.
OS Templates
DNS Tracer
DataCleaner - eobjects
Salary, Job Search, Minimum Wage, Salary Calculator, Salary Survey, Income Tax, ...
CanonCam plugin for FAR manager
TechSelect
Bugtraq: Debian generated SSH-Keys working exploit
very nifty. The shortness of the code is impressive.
Notification Server: A Refresher on File and Folder Permissions | Altiris Juice
Remotely Change the Altiris Agent to Point to a Different Notification Server | ...
Windows XP SP3 is Out - Time to Rebuild Those Base Images! | Altiris Juice
Driver Backup | Personal website of Dave Hope
Squid Top-Site Report Generator | Personal website of Dave Hope
browserrecon project
LinMin™ | Bare Metal System Provisioning of Physical and Virtual Machines
Home | Soothsayer
MySQL Backup and Recovery - The Open Source Backup Wiki (Amanda, MySQL Backup)
Recover a MySQL Table with Zmanda Recovery Manager | Linux Journal
check_ssl_cert - nagios_plugins - Trac
Xplico Internet Traffic Decoder
www.packetfence.org: Home
oCERT.org - Open Source CERT
Zenity - GNOME Live!
Perimeter Institute for Theoretical Physics
Security Configuration Guides
RVTools
upgrade VMware tools installed on all machines.
virtualization.info Rent-A-Lab: The on-demand data center for virtualization pro...
nifty, rent a lab.
RTFM Education » Blog Archive » Video Podcast: Mike on the “Myths of Virtualizat...
BlackBerry Shortcut Collection | BlackBerryInsight
Five Essential BlackBerry Keyboard Tips and Tricks | BlackBerryInsight
Anti Protect - Powered by Web Wiz Forums™
EPE Basic Desoldering Guide Photo Gallery
Electronics and Radio Today :: Constructional techniques
Soldering Guide - Learn how to Solder
Proxmox VE
Laptop Repair Help » DC power jack repair guide. Do-it-yourself instructions.
dimension6 - Replacing and/or Upgrading the Hard Disk Drive in the Toshiba 1115-...
Linux.com :: Synchronize your databases with SqlSync
SILVERCODERS - Quality and Competence - SqlSync
Oral Fixation Mints / Get Your Fix
Love these had them in Dallas, TX.
SourceForge.net: SendmailAnalyzer
rrdutils
Ask Laptop Freak
YouAtNotes Blog über Lotus Notes, Domino, CRM, CMS / Web Content Management, Wor...
some german some english.
Tomboy : Simple note taking
(IN)SECURE Magazine
WebDot Home Page
Blackberry Blog
Main Page - NagiosCommunity
Supercharge Your Camera with Open-Source CHDK Firmware - Wired How-To Wiki
MSFN"s Unattended Windows : Unattended Windows Introduction
Blogs - SharePoint Blogs
Penetration Testing Framework 0.50
In Recovery... - Paul S. Randal on SQL Server
How to properly check for data corruption via a SQL job
Migrating to ext4
CHDK - CHDK Wiki
Canon additional firmware
pactester - Google Code
Pac file tester
sorttable: Make all your tables sortable
Microsoft TechNet: Tweakomatic Scripting Tool
Download details: System Administration Scripting Guide Scripts
TechNet Scripts all in one place. Yum
Scripting Tools and Utilities
NJN - New Jersey Public Television and Radio
WHYY
WFUV 90.7 FM Public Radio from Fordham University in New York City
EERE Consumer"s Guide: Your Home
UpdateStar - Simplify your software life
The Prefix WhoIs Project - Greetings
SQL Server Survey - Report various aspects of your SQL servers
Notes Password Recovery - Recover passwords from Lotus Notes ID files
Sandman
reading the hiberfil.sys in a jif
Salasaga - Introduction
sshpass - Non-interactive ssh password authentication -- Debian Admin
drraw
Twin Wan VPN Gateway XC-DPG503: XiNCOM
The Psychogeography of the USA - World of Psychology
well a sick kinda humor
9xmedia - Multiple displays
Max Power Soft Products
check_oracle_health
HOWTO: Identify the version of BES you"re running - BlackBerryForums.com : Your ...
Welcome to OpenVPN
Ripoff Report: By Consumers, For Consumers
Geeks to Go! - Tech experts answer your questions
OSSIM (Open Source Security Information Management)
MySQL Workbench
vmbackup
GNetWatch project official home page
Free YouTube Downloader+ - download videos from youtube for free
CDPSnarf - CDP Packet Sniffer | Darknet - The Darkside
fsniper - Trac
VNC Thumbnail Viewer « TheTechnologyTeacher’s Blog
The VIEW ADMIN2008
Sandbox - JPing diagnostic tool
Jarrod Creer Limited - Clustering
Notes from Support: Domino Replication
Repcat for Notes
pay tool for cluster replication
Tardy 1.16
Asunder: Home
Nipper - The Network Infrastructure Parser
PWGen Project Homepage
DemocraKey
Shellter
Viralator virus protection via your proxy server
P3Scan - Transparent POP3 proxy
National Fiber Council
DocumentBurster - Java Report Bursting Library
Technitium MAC Address Changer v5 (FREEWARE)
SourceForge.net: TaskForest Job Scheduler
System Administration
Plat"Home
FYI: OpenDNS and T-Mobile Hotspots Don"t Mix | OgasaWalrus.com
SIMILE | Timeline
So very cool
Casino Royale, James Bond : VisitBritain
MilaX » MilaX
How To Make a Screencast | Linux Journal
Planit Technology Group
Linux.com :: Installing and tracking software updates with toast
Introduction to Forensics | Linux Journal
Welcome to CrossLoop
PaperCut - Print Logger - a free print job logger for Windows.
GENSORTIUM full service web agency - Windows Remote Control Programs
WifiZoo
JouleSort
benchmark based on power
Buying a LCD monitor for photo editing | Void Pointer
SNMP4Nagios::Home
ZFS Evil Tuning Guide - Siwiki
AutoRuns for Windows
I, Cringely . The Pulpit . The Truth About IT Consultants | PBS
Love it, love it, love it
WSGW :: The Web Security Gateway
sqlninja - a SQL Server injection & takeover tool
ComplexDiscovery-Computer Forensics and Electronic Discovery - Fullscreen
EDD Blog Online: Forensic Accounting: Finding the smoking e-mail
Two New Articles of Interest on e-Discovery Teams « e-Discovery Team
Linux.com :: sSMTP: A simple alternative to Sendmail
GNU Telephony - GNU Telephony
SmartSynchronize - File/Directory Compare
bist
Bist stands for bidimensional structures (in italian it sounds like "beast" in english ) and is a chemical drawing tool. It is focused on organic chemistry but it may be useful also for chemists or teacher as well.
GALACTICA SITREP
SourceForge.net: Ignoramus- A Nagios Config Generator
WinSplit Revolution
RegCast - IT culture under the microscope | The Register
Creating a winning IT support culture
Chris Sanders » Using ARP Cache Poisoning for Packet Analysis
cain & abel
Lessons in secure messaging using Domino 6
Lotus Notes 6 Help - Using dual Internet certificates for encryption and signatu...
S/MIME X.509 Certificates
Using S/MIME e-mail
E-mail Client Testing for S/MIME Compliance
What is Roaming in Lotus Notes?
IBM - How to create a Roaming User in Notes/Domino 6.x
Lotus Notes 6 Help - Setting up as a roaming user
SourceForge.net: ODESSA
Check to see if a script was run as root | Linux Journal
script snippet
SourceForge.net: SnmpB
du2rrd - OETIKER+PARTNER AG Tools - Trac
Home - BackupManager
stroy: stroy
DisplayFusion : Binary Fortress Software
thought this was opened sourced
Oscar"s Multi-Monitor taskBar
Personal E-mail Certificates - secure e-mail communications
S/MIME - Wikipedia, the free encyclopedia
SMIME.org
How to find the level of SharePoint you are running
BACnet stack - open source BACnet protocol stack
autossh
Liliputing: Guide to overclocking an Eee PC, or how to shorten your battery life
Change the local administrator password on LOTS of domain machines. ~ Ask The Ad...
The Contiki Operating System - Home
The eDiscovery Paradigm Shift
DNS for Newbies
good basic explanation
Ask the Directory Services Team : Documenting Active Directory Infrastructure th...
Full of I.T.
Full of I.T. : Webcast Resources: Best Practices for designing the Active Direct...
SMTPUtils | The Open Source tool for tuning your SMTP server
Autism Speaks, Home Page
Ron Grzywacz"s Blog : SharePoint Anti-virus scanning exclusions
WebHome < Main < TWiki
www.viruspool.net - Homepage
Syslog Fuzzer
Vaughan Rivett"s Blog
RegScanner Tool: Alternative to RegEdit find/search of Windows
The Watering Hole
Common Wireless Antenna Connectors - Gumph
inquiry
Great tool from EMC for inquirying scsi subsystems
Mike"s Hardware
Widelands.org - homepage of a free realtime strategy game
Advanced Strategic Command - Headquarter
Mozilla Firefox, Portable Edition 3 Beta 5 | PortableApps.com - Portable softwar...
RCE Directory
Welcome :: openpacket[.]org
Japanese for Nerds (I) || kuro5hin.org
d3vscan
Welcome to DominoFiles.com - Compare Lotus Notes Domino Solutions by Category
YouTube - AtGoogleTalks"s Channel
Fix Unix
Referencer
Computer Incident Detection, Response, and Forensics: the Basics - CSO Online - ...
Computing Educators Oral History Project
The History of Numerical Analysis and Scientific Computing
Silicon Genesis : Interviews
Lemelson Center: Archives: Computer Oral History Collection
Charles Babbage Institute
Computer History Museum
History of Computing
SIGCIS | The SHOT Special Interest Group for Computers, Information, and Society
IT History Society
hied_northeast.. Cool stuff and happenings for HiEd : Remote Server Administrati...
CoreConfigurator - MS Israel Community
ONLamp.com -- Step by Step: Using Samba to join a Windows Domain
FreeOTFE
USB drive letter manager - USBDLM
Ultimate WRT54G Hacking
IBM - General overview of how to perform a Silent Install of Notes 6.x or 7.x Cl...
Chilling Effects Clearinghouse
netstiff
fromly webdiff
IBM - General overview of how to perform a Silent Install of Notes 6.x or 7.x Cl...
Lotus Notes Unattended Install - MSFN Forums
IBM - Is the InstallShield Tuner for Notes available for download?
EventID.Net
Windows Volume Shadowcopy Services (VSS) Problem Determination
VMFAQ.com / Knowledgebase
Online Technical Writing: Online Textbook--Contents
Welcome to itSMFBOOKS bookshop
httprecon project
Webshag
Linux.com :: Creating a Home Inventory with F-Spot (video)
ITidiots - MCSE training video screencasts
Tobu Tutorial
Nagios Aggregator
VMBK v.3.0 Rev 11
reCareered
Coding Horror: Adventures in Rechargeable Batteries
gubb.net
Security Management And Risk Tracking (SMART)
Inspectd.com - Training Tools for Traders
Wild Bill"s Blog :: SnTT: Out of Office and the importantance of Full Server Nam...
Printer Sharing - DD-WRT Wiki
Upgrading Nagios
» Repair Tool of the Week: WinBubble - Technibble - A Resource for Computer Repa...
Hinx Software.
OpenEMR - Free Medical Records Software - Open Source EMR and Practice Managemen...
Welcome to Schoorbs
Schoorbs is a free room/resource booking system licensed under the GPLv2 which is served as a web application using PHP and MySQL/PostgreSQL.
Error -1018 (JET_errReadVerifyFailure) in Exchange Server 4.0, in Exchange Serve...
Listed as specific for Exchange but will work with any Jet database
Description of the Isinteg utility
Microsoft Exchange Mailbox Merge program (Exmerge.exe) information
Monocle - Blue Gecko Open Source - Trac
www.thinserverarchitecture.com - Thin Server Architecture Working Group
Firing with Dignity
PE Builder, BartPE Plugins, 911 Rescue CD, ERD Commander 2003 Multi bootable CDs...
Create Your Own Font - Wired How-To Wiki
Chris" Realm
Iometer project
Michael Brown - Blogging for Dominos
KoreLogic, Inc. Security Services, Tools
ddp seems to be the most interesting
Autenticating SQUID in Active Directory « Menelkir Hedlund
PaperCut KB | Configuring Squid on Linux to authenticate with Active Directory
America"s Test Kitchen
Cedar Backup
BlackBerryInsight » Howto: Remove BlackBerry’s IT Policy
KwikByte - KB9260
Hardmac.com : Le "Macbidouille" in English
Diagnose, troubleshoot, and resolve Windows performance from Quest Software
Please Note: Spotlight on Windows is unsupported freeware. The license key is provided in the download package and expires one year after installation. To renew, please revisit this website. An activation key will be made available prior to the expiratio
GoDaddy Silences Police-Watchdog Site RateMyCop.com | Threat Level from Wired.co...
interstellar.pdf (application/pdf Object)
Dmitri Tymoczko, Composer and Music Theorist
SCHED: SXSW 2008 Schedule for Tuesday March 11 in Austin, TX
Ultimate GMail Collection: over 80 Tools and Tips | MakeUseOf.com
SourceForge.net: Openbravo POS
Installing Fonts on Linux | Linux Journal
In Unix, how do I remove files with names that contain strange characters, such ...
Space Exploration
Minicomputer
WinDirStat - Windows Directory Statistics
VPN 3000 Series Concentrator
BlackBerry - BlackBerry | Wireless Handheld Devices, Software & Services from Re...
Writing a Windows Installation script
PowerGUI - Administrative Powershell Console : Main
OnPATH Technologies, leader in physical layer switch technology
WinAudit v2.27 - Free Computer Audit Software
SourceForge.net: PHP Point Of Sale
John"s Excel Website
Open Source Point-of-Sale Systems: Worth A Look? | The VAR Guy
Openbravo POS Features
O"Reilly Network -- Top Ten Cisco IOS Tips
Information Systems Security Association
PeaZip: free RAR 7Z ACE PAQ TAR ZIP archiver utility
ONLamp.com -- Step by Step: Configuring SSL Under Apache
Data Center Asset Management, Inventory Control and Configuration Management Dat...
TransProCalc - financial calculator for translators, translation agencies and pr...
McGrew Security Blog
thing for USB flash drives.
Burp Suite v1.1 Available for Download | Darknet - The Darkside
Pushing a CD Key with a Windows Installer Installation | Altiris Juice
Debugging Expect
Concurring Opinions:Battlestar Galactica Interview
NTop-XTRA: The Easy-to-install NTop Flow Analyzer Distribution for Microsoft Win...
Some Things to Know Before Negotiating Salary with a New Employer - George’s Emp...
Server Racks | Rack Shelves | Rackmount Monitors
IT Resource Center - warranty check
International Warranty check.
Warranty lookup - HP Business Support Center
HP Care Pack services
Top 10 Amazing Chemistry Videos | Wired Science from Wired.com
Bos Wars
POWDER
nsftools.com - Notes 8.0.1 Huge Fonts
Canada Goose Control from Geese Police, Inc. Call Us to Get the Flock Out
Reducing the Size of an MSI File | Altiris Juice
Linux.com :: Adding a UPS to a desktop Linux machine
Main Page • d3vscan
http://nopcode.org/0xFFFF/
Spam Haters and Spam Friends: Per User (or Per Domain) Spam Control with access_...
Night"s Dawn
Peter F Hamilton - Unofficial Website
Home
The Unisphere | Forums | A Peter F Hamilton Fan Site - Home
HTTPTunnel - Tunnel Connections Through Restrictive Proxies
Domino for Unix/Linux Start-Script
HTTrack Website Copier - Offline Browser
Distributed Nagios Executor (DNX)
SourceForge.net: NetworkMiner packet analyzer
Applying Group Policy causes Userenv errors and events to occur on your computer...
OpenEMM Home
Secure File Transfer Solutions by Standard Networks - MOVEit Freely - Overview
Zip Cracking - by Crashtest
Lotus Notes ACL Manager | Lotus Notes ACL Administration | Lotus Notes ACL Secur...
Mk-boot-usb: a Script to Create Multiple-Bootable USB Sticks
Network Diagnostic Tool (NDT) On Ubuntu 7.10 Server | HowtoForge - Linux Howtos ...
RadialNet - A Network Visualization Tool
Linux.com :: Get broadband wireless with Verizon EVDO and Linux
ViewGuard™ Privacy Filters & Screen Protectors for Laptop, Notebook & Desktop Co...
The Definitive Guide to Bash Command Line History - good coders code, great reus...
Robert"s Perl Tutorial
Perl regular expressions for the common man
Hobo Copy
DelinvFile - Utility for Deleting Invalid Files and Folders
Batfiles: The DOS batch file programming handbook & Tutorial
Optimize PDF Files - tips on pdf optimization to compress file size & optimizing...
LibTIFF - TIFF Library and Utilities
Just Enough Governance for Notes Blog
My blog has no name.... | Agent Data
IBM developerWorks : Lotus : Lotus Domino Wiki
Windows Server 2003, Exchange advice. Help solving computer problems. VBScript
aTunes
Welcome Listeners !
MRTG OIDs for every device we have!
ProjectPier.org
Anton Chuvakin Blog - "Security Warrior"
pci_dss_v1-1.pdf (application/pdf Object)
Free Software Page
Outport - Welcome
Home of the MD5summer
Ed Brill - Domino as a POP3 server?
Active Directory and Firewall Ports
JSI Tip 9734. How can a script return the local, remote, or all printer names av...
The Ipod Hacker: 100 Ways to Use Your iPod to Learn and Study Better
* popularity dialer
SBA
Five Ways To Get a Free Credit Score (No Trials) » My Money Blog
rootkit.com - Software Firewall: uncommon truth
Tech Buyer"s Guide to Return Policies - dealnews.com
The Inside Track on Recruiters – Top 10 Tips | Advice and Opinion
Dual Career Couples
- Spoogenet: Workarounds - Hacks - Scripts - Soultions - for real world PC and N...
Windows specific?
VbScript Examples SiteMap
A script for everything and everything in a script. Even if it is VBS.
Kernel Mode Drivers are blocking on the target machine
Error when trying to restore printers via print migrator
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks o...
LasCon Storage - Lotus Notes Management
Domino clustering, how does it work?
Lotus Domino Administrator 6.5 Help - Using Tell commands to display cluster rep...
good thinking
bb_lotus_troubleshoot.pdf (application/pdf Object)
myGreenElectronics
GUI Printer Management Utility (Perl)
Whois lookup and Domain name search
Copytechnet Home
Online Community for Copier, Printer, Fax Technicians
Vendor/Ethernet MAC Address Lookup and Search
The ISB Group - IT Services and Solutions
Interesting scripts
PrinterAudit Script v2
Network Printing Tools and Settings
JSI Tip 5379. How do I programmatically create a printer and printer port by usi...
Additional Resources for Designing and Deploying Print Servers
HTA Makes Installing Shared Printers Easy
Microsoft: Windows XP Pro - Automatic installation of "local" printer
Script to automate TCP/IP printer installs
HOW TO: Programmatically Create a Printer and Printer Port by Using PrinterAdmin...
AutoHotkey - Free Mouse and Keyboard Macro Program with Hotkeys and AutoText
Linux.com :: Create a backup server with Restore
All About DVI
The Castle
About Inquisitor
::.. Recycle Your Media - Home Page ..::
Asset Recovery & IT Asset Management (ITAM) Leader: Redemtech
Intechra
DMD Systems Recovery
Russix
Windows Update Agent force script, email results version 2.3 by -- Rob Dunn [WSU...
Microsoft TechNet column: Tales from the Script - July 2005: I’ll Get You, My Pr...
Multi-Monitor Compatibility Database
Multi-Monitor FAQ
ACM Classic: Reflections on Trusting Trust
nms - web programs written by experts
Inside Architecture : Introducing the "Double Iron Triangle" of Enterprise Archi...
"Iron Triangle"
word07shortcuts.pdf (application/pdf Object)
GeekDinners.com - Welcome to GeekDinners.com
TuxWordSmith
FAPG
Unnoc
Radio DavidByrne.com
RogueSynapse
TaoSecurity: First They Came for Bandwidth...
A Guide to Different Kinds of Honeypots
SAP Insider Online
The Mitsubishi Monitor
KeepVid: Download videos from Google, Youtube, iFilm, Putfile, Metacafe, DailyMo...
Download details: Office Update Inventory Tool Version 2.1
BlackBerry Forums at CrackBerry.com
Pinstack.com
BES Admin"s Friend: Complete BES Troubleshooting - PinStack.com
List of Must Read BES Threads for Admins - PinStack.com
Slipstick Systems Exchange and Outlook Solutions Center
Application for U.S. Passport
Diet Tracker
W3Perl - A free web/ftp/email and squid logfile analyzer
Rapid Composition - How to Compose a Photo Quickly
Macro Photography - It"s the Little Things That Count » Curbly | DIY Design Comm...
physical to virtual backup and restore
Digital Television 101
Linux.com :: Scripting Scribus
SSHWindows.SourceForge.Net: OpenSSH for Windows
metromap
Duplicate Files Finder homepage
Tavern Side Room :: View Forum - Patrician III
Badkey Corner
d y n e : b o l i c -- a free multimedia studio in a GNU/Linux live CD
Costco - Costco.com Trade-In & Recycle Program
Transform Your Classic Xbox into a Killer Media Center | Lifehacker Australia
When and Why Should You Start an e-Discovery Team? « e-Discovery Team
Twilight Photography Tips
, but for those photographers with a rock steady tripod, a fully charged battery in the camera, and a good amount of patience, rather creative images can be created in some of the most unlikely of places. For the sake of this article, I’m using a series
JSI Tip 4160. How can I determine the installed software from the command-line?
DABCC | Citrix / Terminal Services Utilities Downloads Page
Ask The Admin | Free Tech Support With A Touch Of Geeky Humor
NASA Workmanship Technical Committee
Network Magic – Easily Setup, Manage, Repair and Protect Your Home Network
Could be very interesting for small networks.
GPU-Z Video card GPU Information Utility
Blog O’ Matty » Blog Archive » Resources from my Java performance presentation
Uninstalling Altiris Agents | Altiris Juice
Remove U3 from a USB Device (Storage) - TACKtech Corp.
StopBadware.org
Linux.com :: sudo, or not sudo: that is the question
Overview
CD and DVD media keep their data only for a finite time (typically for many years). After that time, data loss
Profit - Tantalus Games | Google Groups
T1 Glossary 2000: Glossary of Telecommunications Terms
www.BiggMatt.com
HandBrakeGTK
Welcome to AMTSO - The Anti Malware Testing Standards Organization
Altiris Knowledgebase
NTP Debugging Techniques
Welcome to ASCARON Entertainment UK Ltd - IE
Patrician III - Patrician Gold - Alderman of the Hanseatic League
md5deep
Geek to Live: Hard drive janitor
Remove files after a certain number of days
Automatic installations of SAP on each User PC
INaccess
replacementdocs: The original web archive of game manuals
A Beginner"s Garden of Chess Openings
Album Cover Art Downloader
fcca - Free Conquest & Colonizator of America
The Noegruts Blog: Seagate FreeAgent Pro eSATA problems
Welcome to WhosOff - Staff Holiday Planning Made Easy
mp3check -- a sanity-saving script for rippers.
alvrobot.com
ediscoveryinfo
Net Tools
swiss file knife - free command line text file processor
Delete 0kb files - alt.msdos.batch.nt | Google Groups
ChilliSpot - Open Source Wireless LAN Access Point Controller. Spice up your Hot...
HeadsUp Home Page
Display Acceptable Internet Usage Policy
FINDDUPE: Duplicate file detector and eliminator
Linux Command Line Tips
Project management quick reference guide for Project 2007 - Templates - Microsof...
Sun Presentation Minimizer | OpenOffice.org repository for Extensions
SourceForge.net: PMtool
Castellini on Computers Radio Show with Rick and Adam | The #1 Computer Radio Ta...
Interpage Network Services Inc.(TM) Free Web to Fax and EMail OutFax Service
IBM - The Architecture of Unread Marks in Lotus Notes
The Depenguinator, version 2.0
Relieving the systems management burden | The Register
Phone Call Comments
svnauthcheck
Do More With Less: Port-Based VLANs
Do More With Less: Build a Linux VLAN
Ignite Realtime: Openfire Server
SANS Institute - Building a Secure Nagios Server
vmprofessional
Ken Schaefer : IIS syncronisation tool - tech preview released
zCI _ Unpredictable Simplicity
Acoustic Server Cabinets | Portable Server Environments | Air-cooled acoustic se...
Racks right in the office, cooling?
Active Directory: Learn the Basics and Master Advanced Concepts
Microsoft Windows Server Update Services 3.0 Operations Guide
Knowledge Base : Support - Engineering Computer Network
W2K AD planning at University of Michigan
Georgia Institute of Technology :: Windows Active Directory
Windows at the University of Michigan
Georgia Tech Active Directory Policy
Campus Active Directory Project
ITS Academic Media & Technology - Yale"s Active Directory
Rice IT
Setting up Active Directory at Rutgers
Microsoft Windows Active Directory® Service at Penn State - Overview
UIUC Active Directory
Hack that Phone - Accidentally update to 1.1.3?
Clonezilla-SysRescCD
BYPsoft - Cross Database Comparison
Water droplets - Digital Photography School
Open Source Web Design - Download free web design templates.
VMware Communities: Moving VM form one ESX server to Another ...
XPTracker.org
SourceForge.net: JTTSlite
SourceForge.net: PortWatcher
Home Network Security
robot wisdom weblog
The beginning of all things.
Cogent Communications, global top 10 internet service provider
virtualization.info: Tech: VMware Best Practices for SAP virtualization
A Step-by-Step Guide to Silently Installing and Configuring Adobe Reader 8 | So ...
Software Update Monitor
SUMo
Wink - [Homepage]
Achievo Project Management Software
SSH: Best Practices | HowtoForge - Linux Howtos and Tutorials
http://db.gamefaqs.com/computer/doswin/file/afterlife.txt
WinShares - Home
UEFI - Home
Docstoc.com – free legal forms and business templates
The Open Computer Forensics Architecture
Terminal Services Team Blog
Windows Server Division WebLog
La bodeguita de Nacho : How to rebuild your master database in MSDE when it beca...
USB Pendrivelinux install from Windows | USB Pen Drive Linux
Recycle Your Cell Phone. It"s an Easy Call. | Plug-In To eCycling | US EPA
Soup Recipes | Soup
How to Begin IT Risk Management: Five Steps to Getting What You Want
Hacking and Pen-Testing With The Nokia 770/800/810 Notes
4sysops - EventSentry Light - Centralized real-time event log monitoring
Body Language During An Interview ~ IT Professionals
Educating IT, Legal and CIOs can help control costs and bridge departments - DCI...
Legal risk management requires a corporate strategy, mindset and commitment - DC...
How to create your own Windows file sharing server to share large files
ACM Classic Books Series
Namexif™ (Rename EXIF Photos)
AutoScan Network - Network Monitoring And Management Tool For Windows And Linux ...
Personal Telco Project
FOG :: A Free Computer Imaging Solution - Home
Spider – Keyboard and Mouse not working on Red Hat Enterprise Linux 3 and 4
A Windows Server 2003 computer cannot join a domain after you upgrade it to SP1 ...
Microsoft Office Migration Planning Manager
Dcpromo Demotion of Last Domain Controller in Child Domain Does Not Succeed
Flexible Single Master Operation Transfer and Seizure Process
VoIP Hopper - VLAN Hopping Tool | Darknet - The Darkside
FOSSline » The Root of it All: The meanings of the folders in the / directory
GNU Radio - GNU FSF Project
Podcast directory for educators, schools and colleges
Ronalus : stsadmWin 2007 is here
reStructuredText
SourceForge.net: nipper - network infrastructure parser
nipper
Free Vst’s, Sound Samples, Audio Editors, Sequencers ...
HubbleSite -- Out of the ordinary...out of this world.
Open IT Works
Linux Solutions | Linux Hosting | Linux News and Reviews
The Outpost Universe
TiddlyTasks - v0.2.5 for FireFox - based on TiddlyWiki v2.1.2
Son of Service free volunteer management database software for non-profit organi...
RegLookup Home
Wolfpack Empire
freshmeat.net: Project details for logmover
Keeping your screen clean - The Unofficial Apple Weblog (TUAW)
A Mean Clean For A Glossy Screen - The Apple Blog
Visual Studio 2008 Express Editions
Domino Blog
PLANET LOTUS.org
Lotus Notes documentation: Version 8.0
Curious Inventor - Guides : Surface Mount Soldering
Reusable Bags - Eco-friendly reusable bags, plus facts & news on plastic bag iss...
I"m experiencing difficulty with the maps while using Microsoft Internet Explore...
Catalog Choice - Eliminate unwanted catalogs you receive in the mail
Track Flight Status, Airport Delays and other Flight and Airport Information
Default Limit to Number of Workstations a User Can Join to the Domain
NTLast
Config Manager
Jorge "s Quest For Knowledge!
ns-3 project
Kwok Information Server
David Sudjiman
:: scan.coverity.com : Accelerating Open Source Quality :
Linux Reviews
BerryReview
NotesBerry
.clay - osmo
SourceForge.net: Contact Grabber
Thinking Faster
How to remove data in Active Directory after an unsuccessful domain controller d...
How to Install a Replica DC in an Existing AD Domain on Windows Server 2003
MPlayer - The Movie Player
Troubleshooting Dcpromo Errors
Fix an Unsuccessful DC Demotion
Forcibly Removing Active Directory from a DC - Retire a Domain Controller
Planning FSMO Roles in Active Directory
How to Install Active Directory on Windows 2003
Understanding FSMO Roles in Active Directory
MarkMonitor - Home
How to remove orphaned domains from Active Directory
Corporation Service Company: Trademarks, Domains and Brand Monitoring
[rancid] Re: Migrating from CVS to SVN on different server
[rancid] Re: wrancid/vpn3k additions
NoScript - JavaScript/Java/Flash blocker for a safer Firefox experience! - what ...
nurpawiki - Google Code
WebHome < Gnumed < TWiki
Linux4n6.be
yaGTD - Yet Another Getting Things Done. - Summary [Gna!]
GMnext Home
Sarvant
Unix Server Monitoring Scripts
Simple System Thermometer (systher)
Argus - System and Network Monitoring Software
SYSSTAT
Unix System Monitoring
Wireless: How to enable/disable your wireless connection for stability
Cisco IOS hints and tricks
[oucs] Active Directory Workshops: 4. Presentations
ITsafe
Druid, The Database Manager
Laptop SCSI upgrade via ATA bridge
2.5 scsi
Rants on technology: Checking your round-robin DNS with nagios
Discovery of Employee-Owned Computer Equipment : Internet Business Law
BRL-CAD Home Page
Jobs, Employers, and Job Search Resources - Job-Hunt.org
NetSPoC: a Network Security Policy Compiler
The Personal MBA Manifesto: Mastering Business Through Self-Education (Recommend...
SAGE: Open Source Mathematics Software
check_mysql_perf
the moneygardener
Recovering VMware snapshot after parent changed - Drive:Activated
Transparency in an IT support organization | Yald - Patrick Grote"s Technology N...
Harvard Extension School"s Computer Science E-1: Understanding Computers and the...
Amazon.com: The Fairy Tales of J.K. Rowling
arcwelder - Google Code
Rifters.com: Peter Watts" Backlist
The Squid Web Proxy/Cache Blog
symantec
Computer RAM | Laptop Memory | Memory Card | Secure Digital | Compact Flash | Me...
Willowhayes - Windows 2000 Unattended Installations and related utilities
4sysops - compname.exe - query and rename computers
perihel - closer to the sun
The Sound Of Linux 2007 | Linux Journal
IT Interview Questions Open Database - GeekInterview.com
moleskinerie
Notebook and Laptop Reviews
SecurityCartoon.com
i-doit - News
EC2 or Not -- is your favorite site running on ec2?
ganeti - Google Code
How To Make Yourself Do Anything
http://ser2net.sourceforge.net/
Wikibon - Home
Could be interesting. Lets see where it goes.
http://kovaya.com/perl/hpsetdisp.pl
X-Wrt - Web interface and more for OpenWrt
Hmm need to remember I saw this
Storage Sanity
Zerowait High Availability Blog
Storagezilla’s blog - Vox
Network Appliance, Inc. - DaveBlog : : : : :
The Storage Forum: blog
the storage anarchist
DrunkenData.com
MonoPrice.com - Best quality products at the lowest price
DNS Lookup tool, Reverse DNS lookup tool - www.DNSWatch.info
Free for now?
Find out DNS Server Version With DNS Server Fingeprinting tool
Ian C. Blenke :: Computer Engineer
http://www.db-everywhere.com/
Emerging Threats - Home
Takes the place of bleedingthreats.net
HOW TO: Use Wfetch.exe to Troubleshoot HTTP Connections
Open Source Living
Open CRS Network - CRS Reports for the People
The Megapixel Myth
VMware Communities: Community: VMware Server
sanbarrow.com
Welcome to VMware-land! - Sponsored by Vizioncore
Deluge BitTorrent Client
sanbarrow.com
VMware Communities: What to do in moments of crisis
Creating Encrypted FTP Backups With duplicity And ftplicity On Debian Etch | How...
Linux.com :: Syncing your BlackBerry on Linux
Calculating Subnets with "ipcalc"
BloggingStocks
BBHub
no longer being updated 1/31/07
How to peform a clean uninstall of BlackBerry Desktop Software - BBHub
BES Disaster Recovery
BlackBerryInsight
Kid Icarus FAQ/Walkthrough Final - hosted by Neoseeker
MDAC Downloads
BlackBerry Technical Solution Center
BlackBerry - BlackBerry | Lotus Domino: BlackBerry Enterprise Server Pre Install...
BlackBerry Enterprise Server on Domino Discussion
Kid Icarus Shrine
Skulker2 Home Page
IpodPatcher < Main < TWiki
Chris Sanders » Packet School 201 - Part 1 (ARP)
DUPLICATE FILES SEARCHER - Find duplicate files and calculate MD5 or SHA hashes
UrJTAG - Universal JTAG library, server and tools
dell1600n-net-scan
PSP-Vault :: PSP downloads, community, news
Stuck Pixel Fixer :: PSP-Vault :: PSP downloads, community, news
Windows Cygwin Binary Toolchain Installation - GameOver
hField Technologies, Inc.
THC-HYDRA - fast and flexible network login hacker
http://membres.lycos.fr/mdcrack/
Verizonpathetic.com - Billing issues, overcharging practices and general problem...
Attacking DHCP, and mitigating the threat with a Cisco Switch
Download - PDF Split and Merge
SourceForge.net: OpenUHS
J! Archive
Love it. :)
Chris Sanders » Packet School 101 - Part 4
Chris Sanders » Packet School 101 - Part 3
Chris Sanders » Packet School 101 - Part 2
Chris Sanders » Packet School 101 - Part 1
freshmeat.net: Project details for cmdiag
Download details: RML Utilities for SQL Server (x86)
mst software - maintenance - security - tuning! Windows Tools, Defragmentation, ...
[[kahvi collective audio sculptors - 2k+V] V2.1
Nmap Hackers: Seclists.Org shut down by Myspace and GoDaddy
Why not to use godaddy
Magic Garden | Artificial Plants Laboratory
maemo.org - maemo.org: Maemo is the application development platform for Interne...
Automated Logic - Domino Resources - Team Mailbox v3.25
Cook"s Illustrated-Recipe Resource
LISA "07 man
Hacking the Nokia N810
High-Speed wireless connectivity for mobile devices | AT&T wireless services
Changing local admin password? - Windows Server - Networking
Windows Server 2003 Active Directory Domain Rename Tools
DNS, BIND Nameserver, DHCP, LDAP and Directory Services
How to keep DNS Errors from slowing you down!
AnandTech: Getting the Most Out Of Your Hardware: Motherboard/CPU Utility Roundu...
http://www.galciv1.com/docs/qa.html
JavaScout"s Galactic Civilizations Database - Constructor
Realms Beyond Galactic Civilizations - Tips
Hackito Ergo Sum: The Library Problem
JSI Tip 8649. The PrintDriverInfo.exe utility.
Independent Computer Consultants Association
Free Help Desk Software
MAKE PVC FURNITURE and other PVC projects for home, garden, kids, pets, shop and...
CD Recycling Center - Home
BuildItSolar: Solar energy projects for Do It Yourselfers to save money and redu...
SAGE: Open Source Mathematics Software
NetMBA Business Knowledge Center
S-video out with laptop not working - Ubuntu Forums
sudo aticonfig --tvf=PAL-B #change this to your local TV-format sudo aticonfig --tvs=VIDEO #for S-video output sudo aticonfig --force-monitor=tv #force TV-out, even if TV is not detected
Linux.com :: Manage your documents with Knowledge Tree
USB HDTV Tuner Stick for Windows & Linux (Hauppauge WinTV-HVR-950) : Lunapark6
HVR-950
Computer Recycling of Virginia | Reuse. Refurbish. Recycle.
Welcome to Dell Auction
KisKis - Keep It Secret! Keep It Safe! 0.23
Diane Trout - FreeAgent Drives
Sambascan2 - Asturio Kee
Renaissance Art Leather Journals
10 Tips to Make Your Exchange Server a Good Net Neighbor
Martial Arts of Japan: Koryu.com
Piedmont Distillers, Inc
KnowledgeTree | Electronic Document Management Software | Hosted and On-premise ...
ted: torrent episode downloader
Ross Barkman"s Home Page
The man for Modem Scripts
Mother Earth News: The Original Guide to Living Wisely
How to Learn Computers ~ Chris Pirillo
CoffeeGeek - News, Reviews, Opinion and Community for Coffee and Espresso
HubbleSite - Entire Collection:
DNS Oversimplified: How to check your DNS
Overview | Likewise Open | Products | Likewise Software
An Unofficial ASUS Eee PC EeePC 701 Community
Tokyo Cabinet: a modern implementation of DBM
DataVision Home
Digital autopsy - heise Security
Command Line One-Liners - Blog - SAPIEN Technologies - Scripting Solutions for W...
Cisco - Using PortFast and Other Commands to Fix Workstation Startup Connectivit...
ITT Wiki : Spanning-Tree And Portfast
Altirigos
PuTTY Tray - now portable too!
8 Lessons I Learned From The Cheapest Family In The Nation
What is UltraVnc SC
Tweaking your system to get the most out of BitTorrent
H.E.A.R. | Hearing Education and Awareness for Rockers | www.hearnet.com
IPCop.org :: The bad packets stop here!
Intelligent Insight on PerformancePoint : The road to business/IT alignment
Sharepoint Logging Spy - Home
Windows is !easy, Linux is !hard.
getsnmp
Specops Gpupdate - Remote gpupdate / Wake on lan (WOL) / restart / shutdown
A Lotus Notes Domino database replication primer for administrators
Sarg Reports | InitZero S.r.l. - IT Solutions
The Story of Prince Yamato Take
Computer Security Day
Scientific American: The Secret to Raising Smart Kids
Caring.com: Helping you help your parents
Help Net Security
Terminals - Home
4sysops - FullArmor ADMX Migrator 1.2: Migrate and edit Group Policy templates w...
Chaosreader
Overcoming USB (In)Security - Michael Boman
ediscoveryinfo
Welcome to MapServer — UMN MapServer
Synscan - Programs
GLPI - Gestionnaire libre de parc informatique
A California city rebuilds network using all open source software - Network Worl...
Linux.com :: CLI Magic: Video conversion with mencoder
How to solve Windows system crashes in minutes - Network World
CodeGuru: FTPS vs. SFTP: What to Choose
Startup Manager
Security & Privacy Complete
storageim Home
webkeepass
SANS Institute - The SANS Security Policy Project
USB Hacks: Endpoint Insecurity
VoIP Call Monitoring Demonstrator
Welcome to CE-Infosys
[Resolved] smitfraud-c.msvps with security warning pop-ups - What the Tech
SmitFraudFix
DeltaCopy - Rsync for Windows
About | John J Thomas
IntelliAdmin.com: Remotely Enable Remote Desktop
ManagePC - PC Management .NET application for Windows
ShareWatch Home Page
UaMainPage - EU Edge Open Source - Trac
Aakre Technologies - TimeTrack
Download details: Windows NT Backup - Restore Utility
Classic Cat - the free classical music directory
EDUCAUSE Home Page | About EDUCAUSE | EDUCAUSE
» Active Directory
» Blog Archive » What is the Global Catalog Server?
IBM - Changing the Out Of Office agent schedule
Compiling Perl Scripts into Standalone Executables
Belegarth - Home
Cambridge Computer. Artists in Data Storage.
Absolutely amazing CTO.
Ask The Admin: Useful Windows Keyboard Shortcuts for IT Pros - Part 1
IBM - Keyboard shortcuts in Notes 6.x and Notes 7.x
Quick fix for corrupt view in local database
SourceForge.net: ASTRES
http://www.oracle.com/pls/db10g/db10g.show_toc?which=main&partno=b10825&maxlevel...
The Tendjee
How-To: Where to find parts for your projects - Hack a Day
Unix Admin Corner
Welcome to Battery University
ProClip Mounting System - Device Holders and Dashboard Vehicle Mounts
TabletBlog.com by ThoughtFix
Argus - Home
NVisionIP Download page
Red Hat Magazine
perlcast.com
10 things we hate about laptops
CCNA cheatsheet
What Happens If Your Broker Fails? SIPC Brokerage Insurance Info » My Money Blog
Road, Travel, and Financial Services - AAA
Extreme energy makeover: Home office edition
Example: Backup Exec job status monitoring - Intellipool Network Monitor - Forum
IBM - Troubleshooting Internet HTML e-mails with images appearing as red Xs
SurveyMonkey.com - Powerful tool for creating web surveys. Online survey softwar...
Sarbens Oxley (SOX): Does Your Help Desk Comply?
Ask The Admin: Question: Do I need to have AntiVirus Software running on my Linu...
Ask The Admin: Need to Rip Dvds to files? Use VLC Media Player!
Eight Essential Tips to Overcoming Shyness and Making a Good Impression | zen ha...
Meet and greet
LaTeX project: LaTeX – A document preparation system
Kile - an integrated LaTeX environment
The Many Faces of Mike McBride
Software update for Nokia N800 tablet leaks, fans go gaga | Surveillance State -...
001d6e9c
Creative Commons
TechIQ » Archive » Point-of-Sale Systems Going Open Source?
trixbox CE, an Asterisk-based PBX Phone System (formerly Asterisk@Home) | trixbo...
VirtualBox
Lynis
polishlinux.org » The art of using manuals
syonex: Resources
phpaga
project management and practice management
Support - VMware
VMware Appliance: Unnoc
Main Page - Free-reading
Rands In Repose: The Nerd Handbook
LCFG: A large scale UNIX configuration system
automatically installing
Tips and Tricks - BlackBerryFAQ
Gavin Bollard - Computing and Lotus Domino: Scheduling Cleanup Jobs for your Ser...
RTFM Education
http://www.vmware.com/vmtn/resources/esx_resources.html
How to reset the ILO password on your ESX server - NTPRO.NL
NTPRO.NL
Windows Administration: Disaster Recovery: Active Directory Users and Groups -- ...
Active Directory Components
SolutionBase: Recovering Active Directory when you don"t have a backup
Lifehacker Top 10: Top 10 Free Video Rippers, Encoders, and Converters
pws [pws - passwordsafe]
The Simple Dollar » How to Construct a Killer Resume, From Start to Finish
Organized Home | Clean house, cut clutter and get organized at home!
Yawcam - Yet Another Webcam Software
Password Safe
Helping Your Children Use the Internet - World of Psychology
Disable the RunAs Command
check_oracle - ITeF!x Consulting
OraNails - TSMap - Oracle tablespace map photographer
check_ad - ITeF!x Consulting
Customer Support, Products Repair, Manuals & Troubleshooting on Any Product
Nagios NRPE Plugins for Windows - ITeF!x Consulting
HEYMONitor™ "Oracle Database Monitoring & Alerting Solution"
The Art of Worldly Wisdom by Balthasar Gracian. Search, Read, Study, Discuss.
Gracian manual
Reconnecting a Domain Controller After a Long-Term Disconnection
Verify successful replication to a domain controller
Best Practices for Adding Domain Controllers in Remote Sites
9 creative staircases | The Best Article Every day
Tracker Software Products Ltd - Homepage - Products for End-Users - PDF-XChange ...
Insight for Active Directory v1.0
Altiris Blog Site
Dump your legacy CRM system for Salesforce.com using open source tools - LinuxWo...
Palimpsest: the guide to a (mostly) paperless life | 43 Folders
Wireless resources, Geelong, Victoria, Australia and other places 802.11 (even s...
Main Page - BlackBerryFAQ
Luma - LDAP utiliy, browser and more...
TidBITS : What"s a Firewall, and Why Should You Care?
Absolutely love it
Engcom
Linux.com :: Simplify backups with Synbak
Nagios Monitoring Windows Servers
English - OpenKM
Photos: The history of the digital camera - Crave at CNET.co.uk
STIX Fonts Project Website
4sysops - Comparison of six free RDP client tools
FSlint - Duplicate file finder for linux
Network Security Blog
vulcan
OTRS::Email Management::Trouble Ticket System::Welcome!
IBM - Basic steps for installing Lotus Notes on a Citrix MetaFrame server
Citrix VS Terminal Services
Lotus Notes/Domino Server
DominoBaloney - Lotus Domino, Lotus Notes, Quickplace,Quickr,Sametime and other ...
MuPO
VMware Tips
Blog.thecheapdba.com
Blog.thecheapdba.com » Blog Archive » Oracle alert log scraper in Windows .BAT
OverCR
HowardForums: Your Mobile Phone Community & Resource - How to enable EVDO DUN on...
iPod Video Soldering Tips and Solder Techniques | Video Soldering Tip Downloads ...
How-To: Introduction to soldering - Hack a Day
SambaScanner - A Tool for scanning Samba networks for files
Core 2 Motherboard Complete List - With Hardware Recommendations for a HD HTPC -...
Method Suppot Framework
NS2HTML - The Netscreen to HTML file converter
newbie.blog » The Legend of the ‘Punctured Stripe’
Home
Motley Queüe : Unattended MSMQ installation on Windows Server 2003
SharePoint Hosting and Development : Installing a SharePoint DR farm.
bashcritic - Trac
nrg4iso - Google Code
Getting started with pre-release Angstrom on Collie (Zaurus SL-5500) | Realm of ...
OGC Best Management Practice - It Service Management - Itil
PoorMan"sSMS: Project Home
WSUS Information
QCC Information Security UK - Casenotes
Saving and restoring existing Windows shares
Kwok Information Server
Interesting.
Main Page - SystemImager
heise Security - c"t Projekte - Offline-Update
English ctupdate
Active Directory Script Center - VBScript Samples
This American Life - Podcast
Monitoring Active Directory
SB EventLog Monitor
Frank Heyne Software: FAQ: Windows Eventlog
Windows AD Free Tools
Multi-router looking-glass for PHP
Icrontic.com: Home of the Big Beef Burrito
Beating brownouts: building a super UPS - Icrontic.com
Maximum CPU Temperature | Hardware Secrets
sk1project.org - Home of the sK1 vector graphics editor and UniConvertor
Main Page - OpenStreetMap
iPhone 101: Hacks Vocabulary Primer - The Unofficial Apple Weblog (TUAW)
starcorp - Google Code
Helping Aussie Partners Get Ready for the 2008 Wave Launch : Windows Server 2008...
Tips for creating a security policy - Network World
4sysops - USB memory stick lifespan - The different service lives of SLC- and ML...
How-To: Make a surface mount soldering iron - Engadget
EDD Blog Online: How Changes to the Federal Rules of Civil Procedure Affect Your...
DennisKennedy.blog: Electronic Discovery Trends and Blogs: Thinking Aloud about ...
Law Department Management: An in-house guide to e-discovery practices and resour...
The Cable Guy - Column Archives
lsd.jpg (image)
Best4c beta, Best for chart, The best online diagram tool on earth
SharePoint Beagle Newsletter
SourceForge.net: remoot » home
sipvicious - Google Code
SmallNetBuilder - How To Fix Your Wireless Network - Part 1
DBAzine.com: Welcome! Portal for Database Industry
Aaron Stebner"s WebLog : Mailbag: How to install Microsoft Report Viewer 2005 in...
ReportViewer.exe /q:a /c:"install.exe /q"
Justniffer
ios7crypt.rb - Ruby - Snipplr
DosMan Drivel
Command Line Warriors : /
ZoneMinder: Linux Video Camera and CCTV Security with Motion Detection
Secret Windows command line tools can boost security
Compact Fluorescent Screw In Light Bulbs : 1000Bulbs.com The Light Bulb Supersto...
GNU Solfege - free ear training software | Main / GNU Solfege - Smarten your ear...
PXES HOWTO: M$ only environment
Lanshark - Lan filesharing tool
JTAG Tools
JTAG Finder - Chaostreff Augsburg - Wiki
Twelve Essential Photographic Rules - - PopPhotoSeptember 2007
How To Work 9 to 5 and Enjoy It - Dumb Little Man
Zenview Multi-Screen LCD Displays: Multiple Monitors: Digital Tigers
SQL Injection Cheat Sheet
AutoIt Malware Revisited « Didier Stevens
PatchAholic...The WSUS Blog!
WSUS - View Release
Your Arguing Style Has Health Effects - World of Psychology
SourceKibitzer - Recognizing Contributions to Open Source Software
Linux.com :: A script to tell which workstations are using Samba shares
Excellent walkthrough on scripting process
RESTORE - Trac
The AudioFile: Understanding MP3 compression: Page 1
Videos: Sting Op Of 10 Different Computer Repair Companies Finds 70% Don"t Know ...
How To Keep Good Posture When In Front Of A Computer at Personal Development wit...
GNS3 (Graphical Network Simulator)
Loop-based Music Composition With Linux, Pt. 2 | Linux Journal
Computer Hope"s free computer help
HR Geeks
About openCOD
Opensource Blackberry apps
cfguy - Syncing Lotus Notes with Google Calendar
A simple Plan [PDF]
WindowsSecrets.com - Microsoft Windows XP, Vista, Internet Explorer, Firefox, Wi...
Quick & Dirty Tips :: Legal Lad
¡Yay-me! file » Slacker Manager
How to create, mount, and burn ISO image files for free
Jeff Bigler"s "tact filter" theory | 43 Folders
Web Hosting Dedicated Server Linux Windows Security Managed Articles Tutorials |...
nsftools - Lotus Notes Performance Tips
http://www.networkworld.com/cgi-bin/mailto/x.cgi?pagetosend=/export/home/httpd/h...
Providing Active Directory authentication via Kerberos protocol in Apache
Perl Buzz: Perl News, Blogs and More
The Career Manifesto (Andy Lester"s Blog)
USAIL: Unix system administration independent learning
Twelve items to leave off your resume and cover letter (Andy Lester"s Blog)
photo_falletta5.jpg (JPEG Image, 2430x2823 pixels) - Scaled (28%)
USBVirusScan « Didier Stevens
Re: [squid-users] How to cache Windows Update files? from Andreas Pettersson on ...
refresh_pattern windowsupdate.com/.*\.(cab|exe) 4320 100% 43200 reload-into-ims refresh_pattern download.microsoft.com/.*\.(cab|exe) 4320 100% 43200 reload-into-ims
Home | Projity
Opens MS project files. Finally found it. :0)
Jing Project: Visual conversation starts here. Mac or Windows.
FORTIFY YOUR OASIS: Controlling your job-hunt
CPSR - Computer Professionals for Social Responsibility
Microsoft Biztalk.NET SAP Adapter : Validating SAP Client Libraries ...
How to catch a mouse without a mousetrap
Welcome to www.pelican.com Pelican™ Products - Manufacturer of high-impact, wate...
NextComputing, LLC
Gary Voth Photography: The Forgotten Lens
vixy.net : Online FLV Converter : Download online videos direct to PC / iPod / P...
The Heinlein Archives
LessWatts.org - Saving Power on Intel systems with Linux
Linuxkidd.com
Jott.com - Mobile Note Taking and Hands-Free Messaging
Whatsup
Cyberience Project Manager
SCAN » Home
Im In Your Leenucks Box Changing Your Password | Darknet - The Darkside
The Looney Tunes SoundSource
Getting Started - Symantec Corp.
House M.D. Guide: Fox TV Show Episodes, Characters, Quotes, DVDs
xkcd - A webcomic of romance, sarcasm, math, and language - By Randall Munroe
DRU Disc Remastering Utility - DellLinuxWiki
Debian Administration :: Network Administration : Installation of Tacacs+, Ranci...
Stay Safe Online. National Cyber Security Alliance. Events.
Transcode_Wiki: Transcode Wiki
polishlinux.org » UNIX Pipes, Streams and Redirections Explained
AdmiNotes by Christopher Harvey
NoteMesh - collaborate to graduate
Notecentric - A Place For Your Class Notes
RubyForge: websitary - Webpage/RSS Monitor: Project Info
exscript - Google Code
YouTube - Classic Chris Pirillo
Linux.com :: The dangers of automatic updates
the point of making things idiotproof is that we can all be idiots sometimes
SimManTools
home [Octopussy]
Senuti - Download
Demystifying the Out of Office agent
IBM - Guide to the Notes/Domino Out of Office. Part 3: Configuration of the Out ...
Lotus Notes Out of Office Agent, revisited: Part 1
ThreatSTOP - Internet.Security.Community - Home
Modifying PDF Files With PDFedit On Ubuntu Feisty Fawn | HowtoForge - Linux Howt...
Home | GNUCITIZEN
How to Connect to and Shadow the Console Session with Windows Server 2003 Termin...
Support Alert Newsletter Issue 149, Free Edition
Cornell Notetaking Method Custom PDF Generator
ONLamp.com -- Quick and Clean PHP Forms
win-get Repository
Adaptive Planning - Budgeting Forecasting Applications and Financial Reporting A...
Wing Commander Saga - Home
t
arpalert.org: arpalert modules page
SourceForge.net: Checklist
Love it. This is what Ive been looking for forever.
MyRatePlan.com - Unbiased Comparison Shopping for Services
Open Virtual Machine Tools
HP Jetdirect Download Manager
PickupLine Official Website
SourceForge.net: EarToner
Techm4sters
Home & Home Office - Symantec Corp.
WDS Forum
Backup Exec 11d Best Practices Guides - Backup Exec 11d - STN Peer-to-Peer Discu...
Backup Exec License Assessment Tool - Backup Exec 11d - STN Peer-to-Peer Discuss...
SourceForge.net: FOG - Free, Open-Source Ghost
Heath Stewart"s Blog : Find the Product
How to find de Product code for de uninstallations
ADQueueLoop freeware is a command line tool to watch the Active Directory Replic...
JkDefrag v3.24
safeboot safe?
Network Documentation - Home
Rate My Network Diagram
Windows PowerShell
PowerShell Community Extensions - Home
SharePoint Explorer for WSS3
DirectoryPass - Open source password protection, web site security and Apache .h...
Active Healthy Lifestyles
TapeOp.com
SLB: Motorola RAZR V3 – How to charge and transfer files to your PC!
Bugmenot.com - login with these free web passwords to bypass compulsory registra...
CalNetAD Documentation
Jackson Technical - How to Move Symantec Clients from one parent Server to Anoth...
CompilerBenchmarks" Page
update-zoneinfo
Linux.com :: Keep your laptop and PC in Unison
Where Work Is a Religion, Work Burnout Is Its Crisis of Faith -- New York Magazi...
PC PitStop - value leader in SCSI and SATA enclosures and accessories!
hackers @ microsoft
The Ethical Hacker Network - Nmap from an Ethical Hacker"s View Part 1
WEB HOSTING Reviews: Over 5,000 User Reviews, Search And Compare Tools, and Coup...
Welcome To Creative Loafing
Coding Horror: Screencasting for Windows
Checkstyle - Checkstyle 4.3
vm4all.com
Solaris Jumpstart Automated Install
How can I improve performance using 3ware controllers with the Linux 2.6 kernel?
Clonezilla
Download details: SyncToy v1.4
techPresident – Fact-Checking the Candidates: PolitiFact
UKSatelliteHelp.co.uk » Satellite Alignment Calculator 2.0
Tactical Leadership : Weblog
Michael Wilde (the Wilde)
phpLogCon :: a syslog data viewer for the web
Solaris Troubleshooting and Performance Tuning
Fall, 2005 Troubleshooting Professional Magazine: Shotgunning
Troubleshooting Methodology
disktype - disk format detection
Open1X.org
BlueProximity - GNOME Bluetooth device distance detection and automatic locking ...
g
HANSA International: HANSACANYON
Hampton Roads Technology Council - Technology Center for Southeastern Virginia
Test your web design in different browsers - Browsershots
Vischeck: VischeckURL
Stratus Technologies : Ultra High Availability Servers by Stratus Technologies,a...
Leak-tests results - matousec.com
For personal firewalls
Coldwatt, Inc
iSuppli Corporation : Applied Market Intelligence
indii.org » Tint Photo Editor
Optimize XP
utbound TCP connection attempts per second to 10 from an "unlimited" number (16777214) in SP1. With the new implementation, if a P2P or some other network program attempts to connect to 100 sites at once, it would only be able to connect to 10 per second,
FTP Clients & Servers at All About Jake
pm411.org
Wakefield Peanut Company LLC
cinnamon toasted almonds - yummy
WebHome < Main < TWiki
ntains all current rules, added as each is put into the main tarball and cvs repository. The rule author if available is primarily responsible for the documentation of a rule, however the entire community is encouraged and welcomed to contribute or docume
Ultimate Deployment
Metasploit/Contents - Wikibooks, collection of open-content textbooks
Individual Income Tax Rates-2007
ISECOM - Institute for Security and Open Methodologies
The ISO 17799 Directory.
The Information Security Forum - The Forum"s Standard of Good Practice for Infor...
Python Package Index : Liten 0.1a
RT mailgate - O"Reilly Linux DevCenter Blog
The Many Faces of Mike McBride
WXPNews
The Internet Review of Science Fiction
University of Delaware Library: Special Collections - From Verne to Vonnegut
mirmon - monitor the status of mirrors
Energy Prices State by State - Data Center Knowledge
Building a (fast) Wikipedia offline reader
Anatomy of the Linux networking stack
obby - Trac
Jackson Technical - Tulsa Computer Service and Repair, Networking and Support - ...
How-To Central: Home Clinic - Popular Mechanics
DNS Resources Directory (DNSRD)
The Appliance Blog
Appliance411 - Appliance Purchasing, Appliance Service and Appliance Repair Part...
PatientOS - an open source healthcare information system
PatientOS is a free clinical information management system for hospitals and healthcare practitioners. This software is for physicians, nursing, pharmacy, the laboratory and eventually all hospital departments.
EtreeWiki - Etree Wiki
WANem: The WAN emulator
Free network nightmare.
FreePOPs
Revolution Systems Blog: A Guide to Hiring Programmers: The High Cost of Low Qua...
How to Give Instructions - lifehack.org
Pantry, command-line nutrient analyzer
puppet - Trac
Hard Token Mamagment Framework - Welcome
Network Equipment & Resources Database - Homepage
DRAM latency explained
CCNA Certification, CCNP Certification, CCNA Training, CCNP Training, Cisco Trai...
Configuring VLANs
http://attrition.org/dataloss/dataloss.csv
Are you SURE you want to do this?
OpenCiphers
Midnight Research Labs - wicrawl
RIA-Media Software - Overview
It"s not always malware: How to fix the top 10 Internet Explorer issues
Red X
LinuxDevCenter.com -- An Introduction to Linux Audio
Imperialists :: View Forum - Imperialism 1
Macenterprise.org
AFP548 - Changing the world one server at a time.
Mac Manager
RegAlyzer - The home of Spybot-S&D!
NPR : Support Group Strengthens Mother-Daughter Bond
FreeIPMI - Home
BotHunter Free Internet Distribution Page
Bflow_Home
Trend Micro
CustomizeGoogle: Improve Your Google Experience -- Firefox Extension
A Defcon survival guide | The Register
tcptrack homepage
Home - load testing tool - stress testing tool - WebLOAD
The Perltidy Home Page
Home - PCI Security Standards Council
Cropper - Home
Windows SteadyState: What Is It?
Migratr - move your photos to and from Flickr and other services - The Red Ferre...
FEBE Firefox Extension
About
IronKey
Food Network: Baked Macaroni and Cheese
Phone-man"s Home Phone Wiring Advice Page - Wire Color Codes
Launchy: The Open Source Keystroke Launcher for Windows
mkisofs and cdrecord 2.01 for Windows (Cygwin) (Updated binaries) | smithii.com
InfraRecorder
cdrtfe - cdrtools/Mode2CDMaker/VCDImager Frontend (GUI)
Documenting a virtualization project
Personal Software Inspector (PSI) - Secunia
How To Get Out Of A Speeding Ticket ~ usrbingeek’s musings
MySQL Commands
WeedIT
Rex Swain"s HTTP Viewer
The Garden Monitor Project
VirusTotal - Free Online Virus and Malware Scan
HelpDeskNotes - Help Desk and Technical Support
Forensic Incident Response
Telephone Script: By Reader Request
VMmark - VMware
SME Server Inc. - Home
SMB IT in a box
zsync
Cliend-side rsync. No special server needed.
FastNSF.com | Dedicated To Practical Domino Performance
The Elder Geek on Windows XP
Exploiting the iPhone
Free-SA - statistic analyzer
Cisco Tips & Tricks
HardInfo: System Profiler and Benchmark
Joel Oleson"s SharePoint Land : IISReset is bruteforce, there are civilized alte...
SystemTools.com - Windows NT/2000/XP/2003 System Management Software
Linux.com :: A beginner"s guide to IRC
The IRC Prelude
Great Firewall of China | Home
Microsoft SharedView Beta
FTester - Firewall Tester and IDS Testing tool | Darknet - The Darkside
iTWire - Hacking the TomTom ONE through Open Source
SourceForge.net: TraffStats
PING (Partimage Is Not Ghost)
Reed Media Services -- sendmail_stats -- sendmail log analyzer
T-1 Versus ISDN-PRI ~ IT Professionals
Active Directory Explorer v1.0
Insure your iPhone, because AT&T won"t - The Unofficial Apple Weblog (TUAW)
Print Server Migration using Print Migrator 3.1 - microsoft.public.windows.serve...
Getting Started: Table of Contents[SAP for MIT Documentation on the Web]
polishlinux.org » Screen: Tips & Tricks
SAP R/3 Interview Questions
About recordMyDesktop
jeff"s WebLog : how to cleanly start and stop explorer.exe
Appendix E: Configuring BITS 2.0 and 3.0 for Download Performance
Force installation of WSUS or Windows Updates, email results - WSUS Forums
Microsoft SharePoint Products and Technologies Team Blog : Tons of New SharePoin...
How to submit your firewall logs to DShield | DShield; Cooperative Network Secur...
J.K.Rowling Official Site - Harry Potter and more
The Leaky Cauldron - Harry Potter and the Deathly Hallows (book 7), Harry Potter...
MuggleNet | The ULTIMATE Harry Potter Site - Harry Potter and the Deathly Hallow...
UserAssist « Didier Stevens
A Periodic Table of Visualization Methods
eXtreme Power Supply Calculator Lite v2.5
Kraft - Software für kleines Business
Welcome to EasyUbuntu
Install all the good stuff with no fuss
Tech/libsmbios livecd - DellLinuxWiki
O"Reilly Network -- Getting Started with MySQL Proxy
Free Cisco Documentation & Tutorials
Cisco - IOS Tutorial
Linux Postfix mail server SSL certificate installations and configuration | nixC...
The Japan Times Online -- National News, Business News, Opinion, Sports, Enterta...
qLabels
All About Circuits: Free Electric Circuits Textbooks
~stevenf: W2: A Little Wiki
Elf | Your Personal Email Library Reminder Service
Ultimate WRT54G Hacking
Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview
gumstix - way small computing
Sys Admin
CATS Applicant Tracking System - Home
Veeam - tools for VMware virtual machines management
PHD Help Desk
WirelessAdvisor.com Forums Wireless Phone Service Plans & Reviews
American Tower Home
Learning Center Home - HTML Version
Verizon Learning Center - How Cell Phones Work - Page 1 of 8
More secret iPhone codes - The Unofficial Apple Weblog (TUAW)
Smart Shopper"s Fish Picks
Download details: Virtual Machine Remote Control Client Plus (VMRCplus)
Tech ARP - PC Power Management Guide Rev. 2.0
System Administrator Appreciation Day
VirtualBox
Dynagen
Main Page - VNUML-WIKI
Dynamips / Dynagen Tutorial
A Server Primer for the Channel | TG Daily
How to Get Rid of Things
FlyLady.net: Declutter 15 Minutes per Day
Unclutterer: Tips
Ubuntu Geek -- Tips,Howtos,Tutorials and Articles about Ubuntu Linux (Dapper - E...
Twibright Optar
Decoding the Golay code by hand
CIDR Report
Secure IOS Template v4.7 23 MAY 2007 Rob Thomas robt@cymru.com
Center for Internet Security - Standards
iPhoneSecuritySettings
Laugh along with GNU - GNU Project - Free Software Foundation (FSF)
The Team Cymru Darknet Project
Chess.com - Learn. Share. Play.
iSubwayMaps.com
Amigo.Net: Modem Init Strings
exPhone — clever ways to responsibly reuse or recycle your old cell phone
Webshell
Pixy: XSS and SQLI Scanner for PHP
70-291 - IP Address Lease Process ~ IT Professionals
rsync.net - Secure Offsite Backups, Offsite Data Storage and Remote Encrypted Fi...
Iptables Tutorial 1.2.2
syslogd supporting MySQL and TCP :: rsyslog
APTonCD
Linux.com :: Burning Debian packages and repositories to disc with APTonCD and a...
Manual:Contents - MediaWiki
Manual:Installation - MediaWiki
F7 MediaWiki
LocalSettings.php file is moved from the config directory, you can click on the "this link" to go to your Wiki. Do so now.
BlackBerry Cool | The voice of the BlackBerry community
Exchange Server 2003 Performance Tools
Prepaid iPhone in a Nutshell - The Unofficial Apple Weblog (TUAW)
SnortSMS Project
Welcome to M Senthil Kumar"s Blog : SharePoint 2007 Developers Resources
ExampleAdultSite.com
OAPScan - Oracle Application Server Scanner | Darknet - The Darkside
WebHome < Motion < TWiki
Eli"s Homepage
Age of Empires Heaven
OpenSS7 Project
Configuring Samba 3.0 To Use The ADS Security Mode (CentOS) | HowtoForge - Linux...
TidBITS: Securing Communications with SSL/TLS: A High-Level Overview
Viewing American class divisions through Facebook and MySpace
HeidiSQL - MySQL made easy
Training Home Page - Microsoft Office Online
Help and How-to Home Page - Microsoft Office Online
SecureLinx Spider - The Next Generation KVM over IP
zero U IP KVM
JA-SIG Central Authentication Service (CAS)
The Ultimate Free Guide to Stop Viruses and Spyware ~ Chris Pirillo
Love it.
Home - OpenSourceCMS
Gadmintools - Home
Fundamentals of Personal Financial Planning
sqlninja 0.1.2 Released for Download - SQL Injection Tool »
Freeware Tools and Utilities for Windows
Marketcircle: iPhoney
iPhone webpage display simulator
Agile Product Management
CamStudio - Free Screen Recording Software
Traceroute, Ping, Domain Name Server (DNS) Lookup, WHOIS, and DNS Records Lookup
Snuffle 2005
http://cr.yp.to/publicfile.html
pyAwale - A simple Awale game. - Summary [Gna!]
Denver Water - Main Page
Cancerbero Project: What"s Cancerbero
Yatsuhashi - Wikipedia, the free encyclopedia
Cisco Information
E-cycling Central: Find a Recycler
IPTraf - An IP Network Monitor
Open Source Two-factor authentication: The WiKID Community Edition — WiKID Open ...
WiKID Commercial Open Source Two-Factor Authentication — WiKID Strong Authentica...
Home | NetMRG
WSUS Forums (Powered by Invision Power Board)
SlimTimer - Time Tracking without the Timesheet
Marcus J. Ranum - What Sun Tzu Would Say
A+ Class Info
Connected: An Internet Encyclopedia
Marcus J. Ranum, Computer Security
The Six Dumbest Ideas in Computer Security
stumbler dot net
Geekcorps
Mirek"s Free Windows Software
Password Chart
Information Governance Engagement Area: A Data Discovery Department? | Legal Tec...
Should a Litigation Hold Include Backup Tapes? « e-Discovery Team
The scope of a party’s preservation obligation can be described as follows: Once a party reasonably anticipates litigation, it must suspend its routine document retention/destruction policy and put in place a litigation hold to ensure the preservation o
Laptop Repair Help
aphpkb website
Router as DNS Server
Main Page - Forensics Wiki
GPS Time Server T1000 Precision Clock
101 Most Commonly Asked iPhone Questions - iPhone Forum
Lotus Geek :: Unable to delete Blackberry emails? Here"s a solution...
John R. Durant"s WebLog : Time/Resources/Features
The triangle
Jason Fried on The Project Triangle | 43 Folders
The Triangle
PIPE Networks DC3
Building a datacenter in over 60days
Chris Sanders » The Vulnerability/Exposure Model
Love it
AutoScan - Network Monitoring And Management Tool
How to use automatic TCP/IP addressing without a DHCP server
Linux News: Software: It"s Time to Consider Open Source Software, Part 1
Linux News: Software: It"s Time to Consider Open Source Software, Part 2
CIDR SUBNET MASK CHEATSHEET & ICMP TYPE CODES
5.192
Access Database Corruption Repair Guide
v14, i03: SNMP Trap Handling with Nagios
BlackBerryForums.com : Your Number One BlackBerry Community
SourceForge.net: phpberrystats
Free Firewall Software - Comodo™ Firewall
Case Dissection: General Electric - Does GE Have the Best I.T.?
Ian Bell"s Elite pages
New Page 1
RTsoft - Dink Smallwood
Wing Commander - Privateer Gemini Gold
Dune II The Maker - Home
Babylon 5: I’ve Found Her — Space Dream Factory
MIT ECAP -- e-commerce architecture program
Bluediving - Next generation bluetooth security tool
Women Employed : Welcome
National Association for the Self-Employed
IT Security @ CIS @ Brown
manybooks.net - Free eBooks for your PDA, iPod, or eBook Reader
100 Words Every High School Graduate Should Know published by Houghton Mifflin C...
nettee home page, created Apr 28, 2005, at 15:03
How Hard Drives Work... - Icrontic.com
Nerd Vittles » Introducing Telephone Reminders 3.0: The Free Asterisk Telephone ...
GTKO
pyvnc2swf
vncrec - simple VNC session recorder and player
Association of Information Technology Professionals -- AITP
Welcome to Dirvish
PDFBox - Java PDF Library
OVAL - Downloads
Mightycare Solutions GmbH
VMTSPatchManager
Structured Wiring Systems
Structured Wiring - Smart home wiring resources, panels, DIY networking kits and...
Getting Connected: Structured Wiring Basics
ACM Queue - DNS Complexity: A journey into the sublime complexity of the domain ...
IT Resource Center forums - JetDirect 615n
Calendar Of Updates Calendar
Download details: Group Policy Inventory (GPInventory.exe)
Collectors Universe Forums
Free CMMS Home Page
Facility management software - facility maintenance management is easy and affor...
Vertex42 - Excel Templates, Tutorials, and Software
Foundstone Blast - TCP Network Service Stress Test Tool »
powershell book
Cogito - Home
Automount USB drives in Debian | mattfleming.com
SlySoft Virtual CloneDrive
CIO Newsletters
QoS And Traffic Shaping For VoIP Users Using iproute2 And Asterisk | HowtoForge ...
Tuning LAMP systems, Part 2: Optimizing Apache and PHP
How to secure VNC remote access with two-factor authentication | HowtoForge - Li...
RT Scratches a Trouble-Ticketing Itch
Ubuntu-Watch » Blog Archive » More than I ever wanted to know about chroot jails
The String Theory of How to Retain Geeks? - O"Reilly ONLamp Blog
The Dnssec-Tools Project
Introduction-The Internet Protocol Journal - Cisco Systems
All about qmailrocks.org
VirusKeeper anti virus and anti spyware for Windows
Home | Ubuntu Studio
ardour | the new digital audio workstation
Ardour is a digital audio workstation. You can use it to record, edit and mix multi-track audio. You can produce your own CDs, mix video soundtracks, or just experiment with new ideas about music and sound.
FirstPartner: The Proposition Development Company
lgsp documentation
complete freeware collection » xtort.net
ACPI - Advanced Configuration and Power Interface
ipMonitor Support Portal :: SNMP Center
very handy, good layout to snmp
TalentSpring Candidates
acm.geer.0704.pdf (application/pdf Object)
pwdump6: Pissing Off McAfee Since 2005
fgdump: Take *THAT* LSASS!
Coding Horror: Remote Desktop Tips and Tricks
IT Procurement: Worst Practices | Advice and Opinion
GnuWin32
Structured Wiring - How To - wire your own home network, video and telephone
Webjeweller.com Remove Watch Links
Panda Anti-Rootkit
Drive Manager
AVG Anti-Virus and Internet Security - AVG Anti-Rootkit Free Edition
Neal"s Admin.Notes.: Calculating real-time throughput between endpoints in a LAN...
Sambascan2 - Asturio Kee
Linux system auditing by example
tinc
UWB the The WiMedia Way
AnandTech - Consolidated Security Thread | Windows Vista / 2K / XP
Spyware Warrior: Rogue/Suspect Anti-Spyware Products & Web Sites
Main Page - BlackBerryFAQ
SHPEGS - Solar Heat Pump Electrical Generation System
Statisticians in History
wicd - Home
project-lockdown.pdf (application/pdf Object)
Network security articles and hacking prevention resources for the government an...
SpeckProducts
About - IPython
Elektron
Make your own Ethernet Loopback connector | www.TikkiWeb.net
PENNsound
Open Management Consortium - Home
The Metasploit Project
Microsoft Windows Server Update Services
Download details: ADMX Migrator
IBM developerWorks : Lotus : Notes from Lotus Support
SQLBuster
PhotoRec: Digital Camera Recovery and File Recovery
LogFS - LogFS
TightProjector Software
Linux.com | Turn your Linux box into a PDF-making machine
http://sbd.sourceforge.net/
IndeView - Independent Presentation Viewer (Free Software)
lcdtest: LCD Monitor Test Pattern Generator
with win32 compile
An Educators Guide to School Networks
CCNA Articles
Faculty of Science : Vrije Universiteit
SuTree - free video "how to" lessons and tutorials
ardour | the new digital audio workstation
Inferential Statistics
How To Keep Your Computer Free From Pests And Predators ~ Web Developers
]project-open[ - Open-Source Based Project Management Software
Copy Handler home page - Home
Keywatch - an open source, OSGI-based monitoring system
O"Reilly Network -- Top 7 Things System Administrators Forget to Do
ConMan: The Console Manager
SSL-Explorer: The World"s First Browser-Based, Open Source SSL VPN
CheckDNS - Internet Domain Name Server analysis and reporter
http://home.hetnet.nl/~riky44/s/simcity_4_a.txt
zone
Max The Battery Life Of Your New BlackBerry - BlackBerryForums.com : Your Number...
BlackBerry Thumb Touch Typist Guide (Typing 60 WPM without looking!) - BlackBerr...
[User] HOWTO: Use BlackBerry As Modem For Laptop! - BlackBerryForums.com : Your ...
Blackberry Tips and Tricks - BlackBerryForums.com : Your Number One BlackBerry C...
How to Use the Net User Command
TacVoIP: Hardcore VoIP Security
Linux.com | OpenOffice.org Password Cracker is what you make of it
GameFAQs: SimCity 4 (PC) FAQ/Strategy Guide by PyroFalkon
GameFAQs: SimCity 4 (PC) FAQ by thy451
SimCity Central - SimCity 4 and SimCity 5 Coverage
How to Align Exchange I/O with Storage Track Boundaries
SQLIO Disk Subsystem Benchmark Tool
Tracks
O"Reilly Network -- Five Basic Mistakes Not to Make in DNS
Shashank"s etc log
Simtropolis - The Largest Online SimCity 4 Community
200704251931.jpg (JPEG Image, 1965x1417 pixels)
Internet Public Library:
O"Reilly Open Books Project
UnixTextProcessing.pdf (application/pdf Object)
TinyUML Wiki: Mission
Blood, Bullets, Bombs and Bandwidth
New Scientist Technology Blog: Seeing through walls
Linux.com | Put your OpenSSH server in SSHjail
SSHjail for openSSH
Vidavee Open Source Projects: NVentory
SRecord 1.32
fpschultze - Howto - Batch Howto - How To Automate Windows DHCP Server Configura...
Tech Heads Incorporated
nagios:pnp_en [Ederdrom.de]
Out of the Frying Pan, and into the Cube
OpenRCE
Auto Project Planner - Introduction
An insider"s guide to writing robust, understandable, maintainable, state-of-the...
3 Steps to Creating Ringtones with Ubuntu
ITerating: Wiki-Based Software Guide
TraffStats
System Information Data Collector for HP-UX
Business Plans and Profiles Index, Carnegie Library of Pittsburgh
REDUCE.ORG
Michael S. Dell - Chairman of the Board
Hacking Ubuntu to Improve Performance
Record Editor
Record Editor
Dealing with winmail.dat and unreadable email attachments
Bandwidth Monitoring Tools For Linux -- Ubuntu Geek
Free Windows Management Software Tools by Quest Software
GroupStudy.com - CCIE, CCNA, CCNP and other Cisco Certifications
VirtualPod Downloads
Cool Solutions: Getting USB Devices to work under Windows XP
Cyber-Defense.org : DAD Log Analyzer
FILExt - The File Extension Source
Paint Touch-up Techniques
SplendidCRM | Enterprise CRM Software for System Integrators - Microsoft Open So...
vnStat - network traffic monitor for Linux
mailsend - send mail via SMTP Protocol
CYBSEC Security Systems - Research
Linux News: Software: Free Software Foundation"s Richard Stallman: "Live Cheaply...
"Live cheaply, Don"t buy a house, a car or have children. The problem is they"re expensive and you have to spend all your time making money to pay for them." - rms
displayport-side-by-side-dvi-and-vga.jpg (JPEG Image, 440x192 pixels)
packetfence / news
GCALDaemon - Project Home
aircrack-ptw
Much improved variant of aircrack
Peter"s Solaris Zone
Clocking IT
ISDN Cause Codes
World History for Us All
BYTE.com
The Windows File Shredder - Lifehacker
Guide to Deploying Mozilla Firefox in an Enterprise Published - MozillaZine Talk...
www.dwipal.com - JMIBBrowser, Java Based SNMP MIB Browser
GrokEVT Home
Connections no longer use Local Area Network automatic configuration and proxy s...
Fix to use Local Area Network proxy settings to apply to dialup connections
WindowsDevCenter.com -- PC Deployment with WinPE
ASPN : Python Cookbook : Hex-dump port-forwarding network proxy server
Twisted – Trac
Task Spooler
http://crossroads.e-tunity.com/
Parallelize applications for faster Linux booting
VoIPong - Voice over IP ( VoIP ) sniffer and call detector
CCleaner.com
CA Virus Signature Updates
Monilog - Windows Event Log Analysis
Dia a drawing program
Bandwidthmeter - a speed test script
ADN - Win32 Active Directory Navigator »
ecoIron - All these whirring boxes.: Emergy-C, The Low Wattage Palette
OpenIPMI
wsus - Windows Server Update Services Wiki
Google Sitemap Generator for Windows :: GSiteCrawler
sitemaps.org - Home
Primeleaf Consulting :: Enterprise Document Management & Workflow Systems
no free but interesting
Roadnav
bit-tech.net | Introduction to hard drive technology
OpenCongress
Project Observer Wiki | Main / HomePage
Will do network diagrams??
SmartronixStore: Welcome to the SmartronixStore!
Yost Serial Device Wiring Standard
the 5-in-1 network admin"s cable
Im in love
Guarantee of Service support over MPLS using active techniques.
BGP and MPLS-Based VPNs
MPLS and Related technolgies tutorial and links
Lines to VoIP Bandwidth Calculator
iFAX Solutions: Where HylaFAX Means Business - About HylaSAP
Chris"s Wiki :: blog/sysadmin/MachineRoomArchaeology
Download details: Hotfix Scan Tool for Windows Server 2003 Service Pack 2 Deploy...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Hardening Linux Web Servers
IP subnetting made easy
Year 2007 problem - Wikipedia, the free encyclopedia
Virtrix - Virtual Tricks
Virtrix - Virtual Tricks: VMware: (Auto)patching your ESX host
Daylight Saving Time - Technical Chats
RTO Discover
.:: linux howtos ~ linux howtos home ::.
The trouble with MPLS
Argus - System and Network Monitoring Software
dhcp_probe
PwdHash
File Taxes Online - Do Taxes FREE - File Taxes With TaxACT
SourceForge.net: TaxGeek
Juniper Networks : Customer Support Center : SSG 5 Secure Services Gateway
Spoonfed Hacking - How to Crack WEP (Local Hacking) Tutorial
PReplay - A pcap Network Traffic Replay Tool for Windows »
Information about Daylight Saving Time (DST) and NIST Time Services
Documeron Home Page. Download Advanced Recent Documents Manager. Freeware. Worth...
watchmycell.com | Home
Find your minutes
NagiosCommunity.org
Computor Companion - The Practical Guide to Computing - Winter 2006/2007
Disc Space Reporter
Simple DST Fix - How Come Nobody Has Mentioned This? « The Blade by Ron Schenone...
BerliOS Developer: Project Info - Iso9600 Analyzer Tool
LibriVox
2007 DST Changes And Impacts on Computers
UC Santa Cruz - Information Technology Services - Daylight Savings Changes for 2...
Switching your Linux systems to the new DST
Timezone data
Jeff Hayes’ Security Blog » Blog Archive » Daylight Savings Time
Computing Facilities - School of Computer Science - Carnegie Mellon
Ferret
SourceForge.net: sshguard
KeePassX - The Official KeePassX Homepage
Cisco Blog
TFTPD32 : a free TFTP server and a free GPL DHCP server for windows
Elemental Network Consulting - Undocumented Cisco Commands
Squidguard
dl_smarter_customers.pdf (application/pdf Object)
U.S. Daylight Saving Time (DST) Changes for 2007 [IP Application Services] - Ci...
OpenPrinting - The Linux Foundation
eHour -
Structured Wiring - How To - wire your own home network, video and telephone
Copper in Your Home: Electrical & Communications Wiring
Home Wiring and Electrical Installation Projects for the Do-it-Yourself"er
Rands In Repose: A Glimpse and a Hook
SpyBye
Short Message Service / SMS Tutorial
Linux.com | Using squidGuard for content filtering
GNUJersey
Time Management for *this* System Administrator « Musings of an anonymous geek
Tom Limoncelli"s time management taken from paper to digital.
onboard audio not working w/ubuntu on M2NPV-VM
ATSlog - about the program.
NOPworklog | nopdesign.sk
Tokyoahead - Better Awstats
Amazon S3 tools - Command line S3 client
Filesystem Hierarchy Standard
Debian/Ubuntu Tips & Tricks | Debuntu.org: .deb packages, Unix/Linux Tutorials a...
Open Management Consortium - Members - Members
RCDRUMMOND.NET: Projects/FBDUMP
Preparing for Daylight Saving Time changes in 2007
ForensiT
simply amazing.
The 80 PLUS Program | Home
Colony West Software-Content
Disk Investigator Info and Download page
Help and Support
False Positive Submission
LC ISO Creator
ADTool - Active Directory Domain Listing Tool »
nag@matrix.com
CrypTool - Homepage
Folder Size for Windows Explorer
shush
Woodhead NT4 usb driver
And here I didnt think they made one.
Pseudopod
Gujin boot/Linux/system loader
Very nifty concept. Might take out grub as grub has removed lilo
windowsupdate Upgrading to Service Pack 2 Issues
Aaron Margosis" WebLog : Setting color for *all* CMD shells based on admin/eleva...
Tsung
SAP Blog: Free ABAP Coding Guide from SAP Professional Journal
Linux.com | Make your own packages for Debian-based systems
Main Page - ClusterSSH
Tero-dump wikipedia to html converter
Littlefish Project Details
cable modem monitoring script
mitsubishi.com Mitsubishi Companies
about - Etherboot/GPXE Wiki
Cedar Backup
GSkill.com :: View topic - Asus M2NPV-VM motherboard QVL list and bios setup
So couldnt find this last night. :(
Daylight-saving bug could foil computers - CNN.com
And the media is off folks
Complete MOSS licensing info - Brain Dump
start [OpenRRCP]
SourceForge.net: Riverdrums Load Balancer
Sciret - Knowledge Base
mkvtoolnix -- Matroska tools for Linux/Unix and Windows
RackTables: management framework for rackspace, IP addresses, servers and more!
TidBITS: Daylight Saving Time Saved
Rapidshare Books
Uncle Ted"s Guide To Communications Cabling
Juniper Networks : Customer Support Center : SSG 5 Secure Services Gateway
Free Vista Drivers - RadarSync
Restoring Safe Mode with a .REG file « Didier Stevens
FlightAware - Free Flight Tracker - IFR Flight Status, Tracking, History, Maps
Firefox 2 Tweak Guide - TechSpot
Hidden Administrator - Program for remote administration of computers
CurrPorts: View Opened TCP/IP ports / connections on Windows
Geek to Live: Encrypt your web browsing session (with an SSH SOCKS proxy) - Life...
BigAdmin: DST: Daylight Saving Time Changes (2007)
Tulip Software home page
hewlett-packard LaserJet Point and Print
hewlett-packard LaserJet beta
CPU-Z
http://www.home.unix-ag.org/simon/woof
Linux.com | My sysadmin toolbox
Karen"s Power Tools
documentation: Content
Index of /~shd/foss/pmr
ZIPEncryptFTP « Didier Stevens
THC-HYDRA - fast and flexible network login hacker
Cisco Systems: Embedded Event Manager (EEM) Scripting Community
EVDOmaps - User Based EVDO Rev A Mapping and Coverage Tool
JODConverter | Art of Solving
japanese-vocabulary - Google Code
ipod-tutorial.pdf (application/pdf Object)
IBM - Lotus software: Daylight Saving Time (DST) changes for 2007 will affect Lo...
Rutgers University Computing Services - Camden
Rutgers University Computing Services - Camden
2007 time zone update for Microsoft Windows operating systems
Cromfs: Compressed ROM filesystem for Linux (user-space)
enchanter - Google Code
SafeKeep Home
ifixipodsfast.com iPod How To Video Tutorials
Vulnwatch: Multiple vulnerabilities in SAP WebAS 6.40 and 7.00 (technical detail...
Association of Shareware Professionals: Portable Application Description (PAD)
mcnaught3_kemppainen.jpg (JPEG Image, 1337x460 pixels)
Absolutely lovely
Notes Goddess - Work, Food and Life
Notes Goddess - Work, Food and Life
Notes Goddess - Work, Food and Life
Daylight-Saving-Time-2007---Part-4
Daylight Saving Time 2007 - The agents
Domino Blog
Nolisting - Poor Man"s Greylisting
A guided tour of the Microsoft Command Shell : Page 1
Apple - Support - Downloads - iTunes Repair Tool for Vista 1.0
Speaking UNIX, Part 7: Command-line locution
arpalert.org: main page
signals
getsnmp
http://www.peereboom.us/iogen/
UDP Cast
Apple / Cisco iPhone litigation primer, part 1 - what"s in a trademark? - Engadg...
iPodWizard.net - Home
Catch the Daylight Savings Time Webcast again for the very first time!
DST blues got you down?
Daylight Saving Time Help and Support Center
How to configure daylight saving time for the United States in 2007
Smallvoid.com - Tips for Windows XP, 2000, NT4
:: Reviews : Open Source: Understanding the Core Principals
Time-Zone Processing with Asterisk, Part I | Linux Journal
Bcfg2 - Trac
Puppet
Why Isn"t System Administration Evolving? - O"Reilly Sysadmin
Recuva - Undelete, Unerase, File Recovery - Home
lguest (formerly lhype)
news [NagVis.org]
2007/01/28/21.58 - CentricWare Suite - Trac
VICE FUND
Appliance Parts Pros.com Discount Appliance Parts – Appliance Repair Parts
10 Simple Ways to Lower Your Computer Support Bills
Catdaddy®Carolina Moonshine
Women"s Institute for Financial Education
Airchitex Cuckoo Product
Scott Hanselman"s Computer Zen - Scott Hanselman"s 2006 Ultimate Developer and P...
IP Tables Validator Project
Bika LIMS — Bika Lab Systems
Bayden Systems - SlickRun
Merge MP3
PengYou Project - Simply collaborate - User section
Gliffy.com - Create and share diagrams online.
LaCie - LightScribe Labeler for Linux
Scanhill MSN sniffer
eBox Platform
the debian user » Blog Archive » Howto install OCS Inventory NG
DailyTech - Workaround Discovered For "Clean Install" With Vista Upgrade DVDs
DSTPatch.com
Change to DST in 2007
infoGreG - MSN Messenger v7.5 Password Decrypter for WinXP and Win2K3
WikiStartEn - Linbox Rescue Server - Trac
The Top 100 Alternative Search Engines
Database PIC Search
Long Distance Digest
Some good information if you can get around all the ads
Long Distance Carrier 1010 CODES
List of PIC codes
PortSwigger.net - web application hack tools
Ticket-IT
Network Tracker
Debian install by way of windows
ScanSSH - fast SSH server and open proxy scanner
FlyerTalk - The world"s most popular frequent flyer community
vomit - voice over misconfigured internet telephones
rebuild phone conversations from tcpdumps
LPIC-1 Linux certification training available online
winips | IP Switching made easy
Fundamental Computer Investigation Guide For Windows: Overview
Download details: Computer Investigation Guide
SourceForge.net: WinDD - Disk Dump for Windows
Port 25
Windows Wallpaper Rotator
tcping.exe - ping over a tcp connection
Pentaho Data Integration: Kettle Project
TimeTrax - Timeshifting Software for XM Satellite Radio - MP3, Record, Capture b...
Windows Server Virtualization Calculator
Telephone Tech Talk
..:.:.:: CMScout Website::A CMS for scouting::Home Page ::.:.:..
research
Security updates are available on ISO-9660 CD image files from the Microsoft Dow...
heise Security - Hands-on - Do-it-yourself Service Pack
Articles-Inventory Management and Warehouse Operations
Main Page - Project VRM
Qshift Online Document Assembly and Knowledge Management - David Munn"s Legaltec...
» Repair Tool of the Week: Driver Collector - Technibble - A Resource for Comput...
Joel Oleson"s SharePoint Land : SharePoint Deployment and Provisioning Checklist...
benjaminstrahs.com - iTube
Kimai - Time Tracking For Designers
pimpmynetwork.org :: project observer :: network management system
Cooking Guide and Recipes for Home Cooks
TommyP"s HFSLIP
2007/01/16/22.25 - FreeWRT - Trac
XXCLONE, A New Way of Cloning the Windows System Disk
Freeware Tools and Utilities for Windows
Command Line SMTP Mailer for Windows
Explaining Steve Gillmor - Joel on Software
Well it shouldnt be but it does turn out to be very comical
A Beginner"s Guide To LVM | HowtoForge - Linux Howtos and Tutorials
StorageMojo
StorageMojo » StorageMojo.com’s Price Lists
StorageMojo » Riverbed Price List
UC Berkeley Webcasts | Video and Podcasts: Spring 2007 Courses
vLite - Windows Vista configuration tool
Linux.com | Make Wget cater to your needs
phpEasyProject - Home
Issue Dealer
namistai.nl.eu.org
FtpCube - Main Page
AIIM - The Enterprise Content Management Association
Circuit Board Repair and Rework Guide
Device Info
Azureus : Java BitTorrent Client
PoDoFo
Mark Lyon"s GMail Loader (GML) - Import Your Mail into GMail
HP.com - Management - SmartStart 7.6 - Overview & Features
freeSSHd
freeSSHd
True Hacker!: GIMP Complete Tutorials
Getting more out of Nagios with NagiosGraph | LinuxLaboratory.org
pfSense » Introduction
Remote Administration For Windows
IntelliAdmin.com: Unofficial Windows 2000 Daylight Saving Time Patch
SourceForge.net: cdpr
decode
NeDi - Network Discovery Suite
The NRG Home Page
OpenSMART - The Open (System|Source) Monitoring and Reporting Tool
The Nagios Book :: NagiosBook.org :: The complete guide to installing, configuri...
PocketMod: The Free Disposable Personal Organizer
CreativeIQ: My Mac Won"t Start! A Tiny Guide.
PhotoRec - CGSecurity
Internet Public Library: POTUS
Web Design References: Tools
Benjamin Franklin | PBS
MPT: Knowing Poe: Home
gethuman 500 database
LMCrack - Windows LanMan Hash Cracking Tool with Download »
Lockout Resetter
Junction Link Magic
Tracks :: screenshots
Finally found one that might work for me. :)
LightSquid Home Site : Home
sizeasy - your size comparison website
wpa-buddy
The Keene View
PSOUG Home Puget Sound Oracle Users Group
Personal Backup (VMware) Appliance
FoxyProxy: take back your privacy
Litestep Development: News
TiddlyWiki Guides - TiddlyWikiGuides
OpenStarLogo Community Site - Home
Group-Office homepage - groupoffice - Groupware - welcome 30 download profession...
Stockpickr! Your Source for Stock Ideas
Servprise - Home
Now with Nagios Plugin Integration
RemoteCalendars, the Outlook2003"s plug-in to subscribe, delete and reload your ...
Welcome to Scriptella ETL Project
PIKT System Monitoring, Configuration Management Software
Talend Open Studio for Data Integration: Fast and Powerful Open Source ETL - Tal...
http://www.vicosys.com.hk/bwcheck/
dont like the need to turn on a service. :(
Buanzo: GNU/Linux: Freshmeat Subscriptions
Tomato Firmware | polarcloud.com
D*I*Y Planner | Paper, productivity & passion
PalmAddicts
Slyck"s Guide to The Newsgroups - Intro
Virginia DEQ - eCycling
Open Learning Initiative at Carnegie Mellon University
Videora iPod Converter - iPod Video Converter
iDirectionz - Driving Directions on your iPod
EphPod - iPod for Windows (and Linux) :: HOME
Human Resources
OBM obm.aliacom.fr
Bandwidth conversion calculator | web.forret.com
Nestopia - NES/Famicom Emulator
SynergyMX.com - Freeware and Open Source Software
Z-Cron is a central control center for scheduling and automation of software.
Linux.com | How to configure a scanner"s buttons on Linux
SafePasswd - Generate Secure Passwords
Main Page - Practical PHP Programming
dnsbl.net.au
Completewhois Multi-RBL Lookup
SourceForge.net: ACE DNS Utilities
serlook"s homepage
freshmeat.net: Project details for DMAring
microformats
Roadnav
Macintosh Garden
DBBlast
remove dust from images
/projects/ MAGiCS software online
Dante - A Free Socks Implementation
MLN - Manage Large Networks of Xen and UML virtual machines
Virtual Machine - Terminal Server
VMBK.pl
Pirates Ahoy! - Chasing Booty Since 2003 - Home
Hooked on Pirates! - a Sid Meier"s Pirates! Fansite
Sid Meier"s Pirates! Fansite - Addicted to Pirates! - http://www.addictedtopirat...
bjk: Password Manager Daemon
The Highlights » Universal Password Manager
The Road to Know Where: Ultimate List of Free Windows Software from Microsoft
BBC - Science & Nature - Sex ID
Revelation
Troubleshooting winsock2 corruption issue
Main Page - OpenTom
EpiphanyRadio -- Independent Electronica Groove Internet Radio & Music
SourceForge.net: tEthereal Network Forensic Console
SourceForge.net: DataEcho Session Reconstruction Utility
Home of A43
VLC media player - Overview
DBAComp Home Page
Steel Inventory
midi Podcast
The Edge
Really Rather Good Battles In Space - Home
pNRG :: the pmacct"s Network Resource Grapher
AdvancedRemoteInfo — MasterBootRecord.de - Matthias Zirngibl - AdvancedRemoteInf...
::Aimfix - Jayloden.com::
Terminal Server for Linux
Secure RDP of Windows Terminal Services with 2X SecureRDP
- Technibble - A Resource for Computer Repair Technicians & to get PC tech suppo...
» Repair Tool of the Week: Driver Collector - Technibble - A Resource for Comput...
VirtuaWin - Virtual Desktops for Windows
Welcome to Remote Central: Universal Remote Control Reviews & More!
nouveau Wiki - FrontPage
Software Inspector - Secunia
KACE - | The Leader in IT Automation Appliances
AptZeroconf - PhiDev - Trac
Debian Package of the Day
Midnight Research Labs - Debian Security Pkgs
apt source for the latest security binary security packages
Midnight Research Labs - wicrawl
Index of /~proski/firmware
http://www.courier-mta.org - Benchmarking mbox versus maildir
Automatic MySQL Backup
Backup your MySQL databases automatically with AutoMySQLBackup | MDLog:/sysadmin
Around the Corner v2 - MGuhlin.net - Creating a Backup Image of Your Windows Har...
Around the Corner v2 - MGuhlin.net - Creating a Backup Image of Your Windows Har...
Death and Taxes: A Visual Guide to Where Your Federal Tax Dollars Go
Big List of Free Budgeting Tools and Software » My Money Blog
The SmartMoney.com Capital-Gains Guide (Tax Guide: Personal Finance) | SmartMone...
Lotus Notes IT Management Applications- Tracker Suite
Alluc.org - Free TV-shows/Cartoons/Anime/Music Videos: ONLINE - Alluc.org - News
http://www.newciv.org/whole/schoolteacher.txt
The well-tempered Debian desktop
Multimedia Debian Packages
Burj Al Arab - Dubai - Jumeirah - One of the World"s Best Hotels
First Time
Welcome to SIPp
O"Reilly -- Safari Books Online - Home Page
ReadyMade Blog
HRMGuide.com - US Human Resources
Tom"s Resume Writing Tips
Linux Virtualization and High Performance Computing
IT Management Reference Guide
VMProfessional
Browsing All Pages
OpenSTA Users Home Page - Free Web Load and Stress Testing Tool
MOA2 VMware-admins-toolbox
VMware ESX server hints "n" tips courtesy of Trivore Corp. - [http://trivore.com...
Setting Up A PXE Install Server For Multiple Linux Distributions With Ubuntu Edg...
heise Security - Know-how - How Skype & Co. get round firewalls
Learn 10 good UNIX usage habits
Couple I dont use regularly
Computing | Work-life balance | Economist.com
Open-ILS.org | Home of the Evergreen ILS.
SONG FIGHT!
Surviving the all-nighter
Optimum X
Nifty profile delete tool
Process Monitor v1.01
Sysinternal guys are still alive in the mothership
TNV : computer network traffic visualization tool
Re: Problem with wget password parsing
Escape in hex for special characters in password
LDAP solution that works | Request Tracker | Users
Motowalls.com Gallery - Home
mon.itor.us - FREE website monitoring
Last Minute Gadget Gifts - Data Doctors Computer Services
Winmail Opener - freeware utility for opening winmail.dat and other TNEF-encoded...
Open those attachments meant for older versions of outlook
Converting Dynamic Disks Back to Basic Disks - The Lazyadmin.com
Accessing Network Traffic: SPAN Ports Vs. TAPs ~ IT Professionals
Open Source Community for Network Monitoring and Server Alerts | Hyperic Forums ...
AskApache
Activity Manager
Oggify
RightWebPage - Web Conformance Tool
AppleIIGo
Using PowerShell to find the average size in a group of files
MERIDIAN MAIL / CALL PILOT VOICE MESSAGING
the Art of Virology 02h »
HighlyDeveloped.net - Microsoft Project Viewer
Not free but only costs if print is needed
ModMyMoto - Software Modding and Updates for Motorola Phones - Powered by vBulle...
Hack the Motorola RAZR V3 Tutorial
Hack the Razr!
Who Was General Tso And Why Are We Eating His Chicken? (washingtonpost.com)
x11vnc: a VNC server for real X displays
» Sandisk Connect Plus
Shavano Music Online - Using a Volt Ohm Meter
Current Loan Rates
http://www.rockxp.org
Direct Consolidation Loan - Loan Calculator
Bluetooth echo / delay / sound distortion issues with wireless cell phone headse...
From DOS/Windows to Linux HOWTO
NagiosExchange: Categories: AddOn Projects
http://noc.hep.wisc.edu/nagiosr.txt
G-Ding.TV | Viewing Linux in a whole new way
NetPIPE
We Buy Empty Ink and Toner Cartridges
NTLDR Is Missing - How To Repair « The Blade by Ron Schenone, MVP
SourceForge.net: jnget
rEFIt - An EFI Boot Menu and Toolkit
LANrev - Automated Client Management for Mac and Windows Computers and Software
HomeExchange.com
National Association of Real Estate Investment Trusts
VideoLAN - Free Software and Open Source video streaming solution for every OS!
VideoHelp.com
Key-Based SSH Logins With PuTTY | HowtoForge - Linux Howtos and Tutorials
Winzig
hpodder
Phill"s Homepage
Electronic Discovery Services | Applied Discovery®: Court Rules
Guide to IP Layer Network Administration with Linux (http://linux-ip.net/)
National Geographic: Remembering Pearl Harbor--history, maps
SAP Docs - SAP Books and Docs by Daniel Toba
Knowledge Base Software ::
DNS gotchas and tips
Tail for Win32 - Home Page
alphaWorks : Lotus Notes Command Line Email Client : Overview
Improve LAMP security with Apache Proxy"s directive (mod_proxy)
FLEXnet AdminStudio SMS Edition
TrackWinstall
The program will run in english on english OS
Where Work Is a Religion, Work Burnout Is Its Crisis of Faith -- New York Magazi...
CSS Beauty | CSS Design, News, Jobs, Community, Web Standards
NPR : Podcast Directory
Yeah NPR gets podcasts, it is a happy day
ReplaceEm
Welcome to gqlplus!
Plain Black, makers of WebGUI - WebGUI
Offline NT Password & Registry Editor
Collaborative Protection Against Disposable Email :: undisposable.org
AltOrgPhpWiki - Ti Vo To Go
ForensiT User Profile Wizard
migration tool for profiles
Civilization Fanatics" Center: Fanatical Coverage of the Civilization Series
S K U L L B O X . N E T
InformationWeek | XP Management | Langa Letter: XP"s Little-Known "Rebuild" Comm...
TinyApps.Org : Getting BGInfo to work for all users in Terminal Services
★★★★★ AdvancedRemoteInfo — MasterBootRecord.de - Matthias Zirngibl - AdvancedRem...
UPX: the Ultimate Packer for eXecutables - Homepage
CompuApps, Inc. - Download Swissknife
BootDisk.info | The web resource for bootable Media
Software and Drivers - download HP Drive Key Boot Utility, 7.41.3790.0
humloop.pdf (application/pdf Object)
Electrical Hum Earth Loop
Download details: Windows SharePoint Services Administrator"s Guide
cheat.pdf (application/pdf Object)
Galactic Civilizations II: Beginner"s Strategy Guide - A Forum Post by Draginol
Reed Arvin # Security Tools
JavaScout"s Galactic Civilizations Database - Starting Research and Projects
The Orion Sector: Featured Games : Galactic Civilizations : Downloads
How to set up a mail server on a GNU / Linux system
Netdisco - Network Management and Discovery
SANS Institute - The SANS Security Policy Project
How To Accelerate Your Internet
English - How To Accelerate Your Internet Wiki
Image vs Unattended | Pro"s and Con"s - MSFN Forums
Updating homepage: BIOS modifications -- BIOS help and support
ATA Security eXtension BIOS
Learn Japanese Online
USBVirusScan « Didier Stevens
TuitionCoach: Guidance for Financial Aid and Paying For College
Présentation - Careless Network
SSH: Configuring SSH Secure Shell
20 Must Read HOWTOs and Guides for Linux « foogazi.com - technical aspects for t...
Cacti: The Complete RRDTool-based Graphing Solution
NSClient++ - Trac
Windows Client new home page
USB Snoopy
Pocket PC Techs - WriteSHIELD™ Screen Protector/Lil" Sync® Cable/Power Adapter A...
domain name auction, register expired domain name, register expired domain names...
Welcome to the TechNet Virtual Labs
JOOConverter | JOOReports
EICARgen « Didier Stevens
MAGic MAster project
PHPlicensewatcher - watch your FlexLM licenses
Overview of Six Sigma Sigma Six
OrangeHRM - Home
OpenHRIS - Open Source HR Information System Project
Nerd Vittles
VMware Utilities Homepage
Linux Security - Seifried Security Site
VM Back
IndexUniverse.com - The World of Indexing...and Beyond
USA Spec
ACS :: FAQ
AnnualCreditReport
HDTVexpert — Home Page
O3Spaces - The way to extend OpenOffice.org
WinMerge: Downloads
IP subnetting made easy
DocMGR - DocMGR Wiki
Spiceworks - The Free IT Desktop
Anatomy of Postfix | Linux Journal
Creating a self-signed SSL certificate
FREE GEEK: HOME
FreewareWiki - freeware & free info - A place to look for great freeware, c...
SSL Digital Certificate Technical Support - thawte
The Free Haven Project
IBM Lotus Notes Hints, Tips, and Tricks - This blog helps users learn how to Lot...
myrescue Harddisk Rescue
FIRST - Improving security together
IA Education, Training and Awareness
The Tao Of Backup
[Debian Backports]
Motorola RAZR V3C USB Drivers (File is attached to the first post!) - OSNN Forum
Devices
http://divbyzero.com/linux/Notes7.setup.sh.txt
91.7 FM WMUH Allentown Pennsylvania
Welcome to iPodMods - iPod Repair & Modification Center
Linux.com | CLI Magic: lsof
[aproc]
http://home.fnal.gov/~tarupp/
Unofficial 4004 web site
Meeting Management ~ IT Professionals
Sparse - a Semantic Parser for C
floola.com - Wiwi - Home
Debonaras - Main / HomePage browse
Debian on Intel IOP
SourceForge.net: eNetman
A2 Web Hosting : : PHP 5.1.6 Hosting, MySQL 5.0.x/4.1.x Hosting, Postgres/Postgr...
Web Polygraph
Replace Your NT4 Domain Controller with Samba 3 (Part 2)
Replace Your NT4 Domain Controller with Samba 3
the Art of Virology 00h »
Main Page - Hackingdefined
www.atribune.org - VundoFix.exe
InstallPad - Get programs faster
O"Reilly Network -- Demystifying LDAP Data
pktstat
JNTO Website | Japan In-Depth | History & Culture | Traditional Annual Events
PHARscape - Home
PHARscape - COMGT the 2G/3G utility
Cisco Router Configuration Tutorial
Event Log Explorer - FSPro Labs
Very nice
WindowsDevCenter.com -- Top 10 Tips for Using Windows PowerShell
SourceForge.net: AppleJack:Troubleshooting Tool for Macs
Run IT on a Virtual Hard Disk
Layers of File System and I/O
SourceForge.net: PeaZip
Squid NTLM authentication project
Setting up Squid for NTLM Auth
SoX - Sound eXchange | HomePage
lfhex - (Large File Hex Editor) | stoopidsimple.com
netswitch User"s Manual
Move networks on a linux system. This one is for you and me.
GNU Proxyknife - GNU Project - Free Software Foundation (FSF)
How to Fix a Stuck Pixel on an LCD Monitor - WikiHow
The Partimage Backup Page
partimage
Main Page - Partimage
Hackers Profiling Project
123Macmini.com - A Mac Mini User Community
Linux.com | Create training videos with pyvnc2swf
Openbravo - Welcome to Openbravo
Fixit Guide Series - DIY Mac & iPod Repair
[den4b] - Denis Kozlov
ReNamer
plaxoed! » Little tool to extract all files out of Sharepoint [Mark Jen’s life @...
altinity.org
Nagios (NETS notes)
Wyd - Automated Password Profiling Tool »
The Home Energy Saver
NUU - Network Update Utility
OpenChange - Download
Versatile Maintenance Tracker - VMT
Diagnostics CD
Apache Performance Tuning - Apache HTTP Server
Thrifty Mommy » Foods That Can Benefit Your Health
Sun BluePrints Online - The Sun BluePrints Guide to Solaris Containers: Virtuali...
Control the world from your web browser! - Ships Overnight - 15 Day Free Trial!
IP addressable Remote Power
Computer Science Unplugged
lrzip
Opensched
Linux, FreeBSD, OpenBSD, NetBSD, HP-UX, Tru64 Unix Documentation Project
Jafe
Moodle - A Free, Open Source Course Management System for Online Learning
LDAP Series Part IV - Installing OpenLDAP on Debian Plus Some LDAP Commentary | ...
Montessori Bookshelf
Test-Um Inc, - The Intelligent Test Solutions Company
The History of Notes and Domino
Knoda database frontend
gFast File - Home
sshban :: homepage
Download details: Windows Vista Step-by-Step Guides for IT Professionals
DMTF - Common Information Model (CIM)
LDAP Series Part III - The Historical Secrets | Linux Journal
The Nagios Book :: NagiosBook.org :: The complete guide to installing, configuri...
William Gibson - Official Website
RyanVM"s MSFN Files Page
BBC - Languages - Learn Chinese
Learn Spanish: A Free Online Tutorial
Be Jane | The First Women"s Home Improvement Resource and Online Community for D...
An Awk Primer
Free Music Theory Workbooks!
Tech News - Network Connectivity Tester
Digital Genesis Technologies - CBLM
The 2007 Microsoft Office System - Learning Portal
T1 PRI Troubleshooting Flowchart [T1/E1 & T3/E3] - Cisco Systems
Troubleshooting Serial Line Problems [T1/E1 & T3/E3] - Cisco Systems
T1: A Survival Guide: Chapter 5: Timing, Clocking,and Synchronization in the T-c...
Cisco - T1 Layer 1 Troubleshooting
Cisco T1 Guide
thinair: Diplomacy of troubleshooting and the telecom alphabet soup: T1, CRC err...
T1 Fundamentals
Troubleshooting T1 Circuits
OpenSS7: Documentation: FAQ: FAQ#13
Cisco Connection Documentation
Configuration Management: Best Practices White Paper [High Availability] - Cisc...
The Cisco-centric Open Source Exchange Community
Maintain Project | Powerful Open Source Network Management
Main Page - OpenNMS
Linux.com | How to share a scanner on your network
KDE
nPassword
Server Web Administration Tool
sgtd - Simply Getting Things Done
Windows Updates Downloader
Auto Repair Advice
SourceForge.net: vncspy
SARA
alphaWorks : KeyMan : Overview
4sysops -- Expanding a virtual VMware disk
Sean’s Obsessions » RedHat/Fedora SSL keys - removing password
Keytool cacert extraction to PEM format using OpenSSL and keytool
SSL-Cert-howto
KSB"s openssl command line Notes
Linux.com | Build a centralized log management and monitoring system
Go Awstats
3.1 Introduction
Why is the startup so funky in HP-UX
Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh S...
Linux Network Printing with JetDirect
Certificate Management with OpenSSL - General Stuff
Samba-3 by Example
squish
Less Than Zero Threat, Part 1 - IT Observer
SSLBridge - Open Source Linux VPN software - Samba Browser
IBM Redbooks | Linux Client Migration Cookbook, Version 2: A Practical Planning ...
Linuxtopia - On-line Linux and Open Source Technology Books and How To Guides
openQRM
SSL Certificate FAQ from VeriSign, Inc.
Generating an SSL Certificate with Apache+mod_ssl
Gen CSR with OpenSSL (OIT)
Excellent script for Generating a Cert
Getting a head start on ITIL | InfoWorld | Analysis | 2006-10-20 | By Randy Stei...
JGUI: BLACK (Samsung i320 Smartphone)
iPod Storage Calculator | iLounge
Linux.com | CLI Magic: Salvage lost partitions with gpart
Tunneling with SSH
WebIssues | Issue tracking and team collaboration system
Lego Math Sculptures
frequently used SSL commands
The Complete Works of William Shakespeare
mytop - a top clone for MySQL
Main Page - Moto4Lin
Oracle Performance Tuning
OpenSSL to Keytool Conversion tips
Last.fm - The Social Music Revolution
Best Practices For Policy Writing ~ IT Professionals
Oracle SQL Developer (formerly Project Raptor)
PaycheckCity.com - Paycheck Calculator
PhishTank | Join the fight against phishing
MathEclipse - AJAX Online Calculator powered by Google Web Toolkit
TrustedReviews - The UKs premier source of IT News and Reviews
The complete work of Charles Darwin
Missed this the first time
iCalcreator
feudalistic Dynasties
FreeWERM - FAQs
Linux.com | OOoBasic crash course: Working with files
Squeezer2 #*#*# SQUid optimiZER 2
Oracle
Index of /~appro/linux/DVD+RW/tools/win32
Josh Highland"s Blog / Journal / Whatever
Welcome to the Government Open Source Conference 2006 website. | GOSCON "06
Fix-IT.org
How to Get out of a Cellular Service Contract - WikiHow
Main Page - su.pport.us
Home
I dont know what this is yet. It looks like some weird Hybrid
Squid Users Management
Find local grocery flyer deals weekly and plan healthy meals. Make a grocery lis...
Packages Knowledge Base Home
RyanVM"s Windows XP Post-SP2 Update Pack
Get Safe Online :: Home
happy mailing : Blat online
fabFORCE.net
AccessPDF - Pdftk
IST Database Administration
Vim Color Scheme Test
Shibboleth Project - Internet2 Middleware
Journeys" End: Setting up proxy.pac with apache2
Bust Banner Ads with Proxy Auto Config
Graeme"s squidview
Effective Meetings, Your Meeting Resource Center
Cisco Routers and Switches - TechRepublic
Configuring Network Security with ACLs
gnoMint | Certification Authority management made easy
pdfforge.org
xkcd - A webcomic of romance, sarcasm, math, and language - By Randall Munroe
Windows Administration Support Portal (elings.com)
Interesting list of links to review. The popup is kinda annoying.
HDTV Pub - High Definition Hardware, local DTV information & more...
AntennaWeb
Travel Blogs | Travel Reviews | Travel Tips | Trip Planner
Ortro
Scheduler, and other things
Cultivation: a video game by Jason Rohrer
CdromMd5sumsAfterBurning < Wikilearn < TWiki
Some things you just expect to work and then dont. Grr.
Easy Backup and Restore | Linux Journal
SourceForge.net: Files
Connect to console via RDP
PayScale - Salary Survey, Salaries, Wages, Compensation Information and Analysis
VMGuru.com
H-Inventory
lcdresource.com - Home
安全焦点::安全工具-IceSword1.18en.rar
Version control for Linux
How to Cook Everything :: Recipe Guide
File Encryption Software for Windows - AxCrypt Free AES File Encryption for Pers...
Restoration download and review - file undelete utility from SnapFiles
Main Page - CGSecurity
Category:Preferences - MozillaZine Knowledge Base
Packages Knowledge Base Home
start - Etherboot/GPXE Wiki
Remote Network Boot via PXE
Download details: Microsoft Device Emulator 1.0
freshmeat.net: Project details for reTCP
Welcome to Petri.co.il by Daniel Petri
www.atribune.org - Home
SANS - Internet Storm Center - Spam Backscatter
Good terminology review of what backscatter is
Zoho - Affordable software for individuals, small & medium business
Veeam FastSCP for VMware
Secure Computing: Product Manuals
401kBrokers
NirSoft - freeware utilities: password recovery, system utilities, desktop utili...
Lots of goodies
Defrag v2.23
Free Rainbow Tables
LotusUserGroup.org -- Home
htpasstool v1.0
iPodScreenSaver
OBD-II Trouble Codes - OBD-II DTC Trouble Codes Repair Help Site
Freediag - Vehicle Diagnostic Suite
OBD-II - On-Board Diagnostic System
networksecuritytoolkit.org
48bitLBA.com - HOME
Tools and utilities for Windows
Virtual Drive Manager - VDM
Virtual Disk Driver - VDK
SourceForge.net: phpPasswordManager
Might be what Im looking for
www.phpip.net: IPv4 address managment suite
Welcome to ChoiceTrust
AllFinancialMatters » The Bogleheads’ October Project
Enigmamusic.com - The Ultimate Enigmafan Experience
Migrating settings to a new profile - MozillaZine Knowledge Base
deep-ssh
Debian Linux (on HP) - Home
Debian on ProLiant
Adapter for Dell Power Supply
EndPCNoise.comYour CartWe Ship InternationallyLow, Competitive Prices24 Hour Shipping HOMELoginserviceabout us Silent PCs and the best quiet PC components including quiet computer cooling, quiet power supplies, quiet hard drives, and quiet CPU fans, at lo
Sjitter - Network performing tool
SqStat 1.20
The Network Simulator - ns-2
Network toolbox netwox
Main Page - OESF
1100 Mah Battery Replacement
Enterprise Data Group - Home
A Brief Guide to Certificate Management
Notes On Bringing Up A New T1 Circuit While Experiencing LMI Issues : Net Observ...
MP3FS
Todo.txt - Task tracking for command line lovers
Super Grub Disk : En
LDAP Series Part II - Netscape Directory Server | Linux Journal
LDAP Series Part I - "Bulldozer" | Linux Journal
log_analysis
Incollector
iKog - the simple todo list
Cobbler -- provisioning made simple.
xen-tools.org - Xen Software: xen-shell
ocre
Ethane - The easy to thrive ad hoc network
project management - free process, techniques, tools, tips and training
IT Project Management for Project Managers - gantthead.com
Project Management
VMware Infrastructure | VirtualCenter
VMware Virtual Machine Importer
JungleDisk - Reliable online storage powered by Amazon S3™ - Jungle Disk
Wire Management, Label Printers, Heat Shrink Tubing, Tool Boxes & Wire Loom
Learn Japanese with JapanesePod101.com
BindShell.Net: Echo Mirage
PC Wizard
DivX Labs | Propellants for the mind
Conduit Literary Magazine
TURBO CHARGE - Cell phone charger that uses a "AA" battery! Works anywhere on an...
A geek toolkit must
SourceForge.net: SQLGotcha
Hardened-PHP Project - PHP Security - Suhosin
Insecurities_in_AoE.pdf (application/pdf Object)
The Sleuth Kit & Autopsy: Digital Investigation Tools for Linux and other Unixes
Tcpreplay - Trac
Beginner"s Guide to Wireless Auditing
PhreakNIC 10 :: Nashville, Tennessee
MAKEMSI - Make MSI based installation files. Can automatically build new or upda...
Yotophoto | Find free photos... fast!
Sheet Music Collection: Lewis Music Library: MIT Libraries
The Chronicle: Site sampler
NIST Computer Security Special Publications
nerdcorehiphop.org
valuca
BASTILLE-LINUX
Debian_server
NewServer
Check list for new servers
Poetry Source : Express your felling, free poetry, poetry, poem, a new poem ever...
IBM Redbooks | Domino 7 Performance Tuning Best Practices to Get the Most Out of...
KC Softwares
Get Free Downloads on the iTunes Store!
How to get Windows PowerShell RC2
Motley Fool CAPS
Computer Antivirus Research Organization : HomePage
Ten Most Used BitTorrent Sites Compared
Tracking the source of email spam
ewido - anti-spyware and anti-malware solutions
Hak.5
NIST Net Home Page
Setup a network nightmare with linux instead of freebsd
ConsumerReports.org - 20 free ways to save energy 9/06
"ClearNet Security" : Competing for network-based security assessments
Invirtus - software to make virtual machines more accessible to more people - Tr...
Yersinia is a network tool designed to take advantage of some weakeness in diffe...
IT"s seven deadly career sins | InfoWorld | Analysis | 2006-09-18 | By Richard G...
johnny.ihackstuff.com :: I"m j0hnny. I hack stuff.
Love it
Foundstone, a division of McAfee, Inc.
Sprint PCS Software: Sprint PCS Connection Manager Software from Sprint
HFS - Http File Server
UNIX productivity tips
shc(1)
PC Engines Wireless Router Application Platform
» Drowning in Debt? 6 Tips for College Students and Recent Grads on Consumerism ...
FinAid! Financial Aid, College Scholarships and Student Loans
News on Pea-Peach project: Pack (archive, compress), Encrypt, Authenticate
HomePage - RT Wiki
Index of /quadkonsole
Consoles aplenty
Linux.com | Point, click, root: System exploitation with open tools
chordbook.com
Welcome to Simple Groupware !
Mini vMac - a miniature Macintosh emulator
cabextract
SourceForge.net: JNFA - Java NetFlow Analyzer
Openfiler — Friendly enterprise storage management platform
ISO Master: Home
News | Varnish
JungleDisk - Reliable online storage powered by Amazon S3™ - Jungle Disk
Welcome - usbcell.com
OS/2.cz -
OS2 World.Com - An International Collaborative Community
Debian Administration :: LAMP on Sarge (Apache2, PHP5, MySQL5, phpMyAdmin, Smart...
home [Dotdeb]
iProng : iPod, iTunes, and Music : News, Commentary, and Reviews : Switch to iPr...
ANSI X12 EDI Format
Kleinschmidt Inc. - The EC/EDI VAN - X12 Transaction Descriptions
recordMyDesktop Homepage
Employee Time, Attendance and Payroll Software
Epiware - Open Source Document Management Software , Online Calendar, Task Manag...
networksecuritytoolkit.org
SPF: A Sender Policy Framework to Prevent Email Forgery
ddwrt
MySQL FAQs - Command-Line End User Interface mysql
:: www.icodex.com :: ICODEX Software AG - The Integration Architects
lf382, Applications: A toolchain for transformation from paper to HTML
LSAT home page
Main - Welcome to WikyBlog.com
http corner <- mysqlblasy (MySQL backup for lazy sysadmins)
Intute - the best Web resources for education and research
uanr.com - SD/MMC card fits in floppy edge-connector
Welcome - ticalc.org
BugHunter - MalWare Removal Tool
MBROWSE
System Architecture Design, Development, Review, Security, Performance, Audit, V...
spiralbound.net » Why Modern RAID 5 is Ideal for Oracle Databases
antenna.swf (application/x-shockwave-flash Object)
Wireless Recycling
Learning - Six steps for learning difficult subjects quickly
Network Weathermap
Setting up Subversion and websvn on Debian | HowtoForge - Linux Howtos and Tutor...
Repair4MobilePhone: How to Upgrade, Repair, Disassemble a Mobile (Cellular) Phon...
YATT
KillBox.Net
LinuXchangE
CuteFlow - Open Source Document circulation / workflow system
ShowMeDo
JavaForge - CodeBeamer
webmethods like
Chaogic Systems - vHost : Main
ConTagged -- CosmoCode GmbH
AsItHappens
HelpSetMaker - An application for authoring online help information
UML CASE Tools - Free for Learning UML, Cost-Effective for Business Solutions
http tunnel
SourceForge.net: CK-ERP
Open-AudIT
VMTN Discussion Forums: Forum Home
VMTN Discussion Forums: How to install VMTools to Debian 3.1 ...
v13, i01: Emulating Networks Using User-Mode Linux
LinuxFocus, the international, multilingual volunteer GNU/Linux magazine
LinuxFocus Magazine
TCP Tuning Guide - TCP Tuning Background
Enabling High Performance Data Transfers [PSC]
Elemental Games Forum
Cisco 7200 Simulator - IPFlow Netflow Collector
Cisco Learning Blog
good ospf commands
MIT IS&T: Stock Answer Menu 7246 - Request Tracker (RT) on help.mit.edu
BigAdmin Feature Article: RT: Request Tracker, Part 2
BigAdmin Feature Article: RT: Request Tracker, Part 1
Optimal Use of Fonts on Linux
Relax & Recover
Dissy - MIPSlab
Montastic: the free website monitoring service
Global Text Project
StarForce Drivers Removal
Cisco Feature Navigator - Cisco Systems
Packaging tips for unofficial Debian packages
Cisco 7200 Simulator
USB Indoor/Outdoor Thermometer (or, "My first USB device")
GTDGmail - The Firefox Extension that Combines Gmail with Getting Things Done - ...
SourceForge.net: Matrex
unspreadsheet
SourceForge.net: Dual DHCP DNS Server
Vleu.net: Shake
50 State Bluebook Guide
vmwarez.com: A site about Virtualization, Virtual Machines, Server consolidation...
HP.com - HP Virtualization with VMware
NetViewer Demonstration
MDB Viewer Plus
Live View
Main Page - NSMWiki
(IN)SECURE Magazine
The TCP/IP Guide - The TCP/IP Guide
Security Engineering - A Guide to Building Dependable Distributed Systems
Guest Review: Fraser Speirs on “Time Management for System Administrators” | 43 ...
Phlog :: Phunsites Blog » Blog Archive » Installing VMWare Server on Debian Sarg...
RFC 3463 (rfc3463) - Enhanced Mail System Status Codes
ISO Recorder v 2
Check your PHP code at every level with unit tests
Simple Invoices
www.run-virtual.com
HowardForums: Your Mobile Phone Community & Resource
Linux Get list of installed software for reinstallation / restore software | nix...
Index of ftp://ftp.xelerance.com/knownhosts2sshfp/
DMAK
Partition Logic
projects:start [SphereNet Wiki]
FIRST.ORG.MY
How to troubleshoot issues with a Robotic Library or Tape Drive in Backup Exec 9...
Downloads - LiteStep Open Source Installer
LifeClever ;-) » 10 tips for keeping your desk clean and tidy
KLOTH.NET - about radio and internet, DNS lookup, whois, antispam
Contribs.org-News
SlimTimer
Dawn
How to I copy Outlook Express Contacts into Lotus Notes Address Book?
Import Outlook Contacts to Lotus Notes
Linux Box Admin
secret-shamir.pdf (application/pdf Object)
USBSink - File Synchronization over USB for GNU/Linux - Home
VoIPowering Your Office with Asterisk: SOHO VoIP, Part 5
VoIPowering Your Office with Asterisk: SOHO VoIP, Part 4
VoIPowering Your Office with Asterisk: SOHO VoIP, Part 3
VoIPowering Your Office with Asterisk: SOHO VoIP, Part 2
VoIPowering Your Office with Asterisk: SOHO VoIP
surblhost — program to identify spam-related websites
Project Based Calendaring System - Home
SURBL -- Lists
Webmail.us, Inc. | The Email Hosting Company™ | Business Email Hosting
Speaking UNIX, Part 2: Working smarter, not harder
Integrating Oracle with the Windows Active Directory | Dizwell Informatics
Mario Iseli » Blog Archive » Debian GNU/Linux in a Microsoft network? With winbi...
System Administration: Another Step toward the BIND - V | Linux Journal
newsobserver.com | Credit freeze better than insurance for ID theft
Notalon: An Open-Source Cornell Notes Application
Jebi
ignis: the heat-strengthened backup tool
easy TicketManager
Gnumed
extendedPDF creates PDFs with bookmark trees, hyperlinks and notes
Thinking Rock
Linux.com | CLI Magic: Enhance your YouTube viewing pleasure
OpenedHand
The Dude
Very cool.
Getting Things Done Software Systems (Part 1 of 2) - Download Squad
good walkthrough on what GTD is about.
Planet Malaysia Blog » Blog Archive » Bandwidth Monitoring Tools
Linux.com | Printing Avery labels with Linux
Linux.com | Processing RAW image files on Linux
GNU Classpath - GNU Project - Free Software Foundation (FSF)
Jitterbit Open Source Integration - Business Integration Made Easy.
Webmethods replacement?
Being organized means marshalling resources - The Boston Globe
Your Vacation Message: Make It Work for You
Totally Geek :: Network Device Change Control (NDCC)
Steve.org.uk: Free Software - debian-updates - Be notified of Debian package upd...
IEEE Virtual Museum—The history of electricity, electronics, and computers
Network Downloads : FastCache /// AnalogX
Total Internet Anonymity
Linux.com | CLI Magic: Make instant Web banners from the command line
ITH Homepage / IT Harvest - Corporate
VideoHelp.com :: View topic - How to convert TV Series DVD episodes to DivX/XviD...
Wapiti - Web Application Scanner / Black-box testing »
stu.dicio.us
RFC959
Thesis writing in LaTeX
Active Virus Shield - Free Anti-Virus Protection Courtesy of AOL
Lotus Notes Project Management - Tracker Suite
CENIC - CVS Firewall Configuration
IP Ports and Protocols used by H.323 Devices
HP LaserJet 8100 Printer series - HP Jetdirect and Embedded Jetdirect Inside Pr...
IT Resource Center forums - Laserjet 4600n not detecting Jetdirect 615n
615N jetdirect replacement out of warrenty.
System Administration: Another Step toward the BIND | Linux Journal
System Administration: Another Step toward the BIND - IV | Linux Journal
System Administration: Another Step toward the BIND - III | Linux Journal
System Administration: Another Step toward the BIND - II | Linux Journal
Profiles
.:: Open MoveOver ::. The Windows to Linux Desktop Migration Tool
VIRUSTOTAL - Free Online Virus and Malware Scan
Online malware scan
Hacking Exposed VoIP: Voice over IP Security Secrets and Solutions by David Endl...
pound
x11vnc: a VNC server for real X displays
RegLookup Home
Unixsurplus - Great Deals on Sun and Unix Hardware! Home
How to detect proxy server automatically
Norfello - Norfello CMMS Open Source
ProfZone Anteater
LogAnalysis.Org
Computer Repair, Networking, Security & Wireless North of Boston, Southern NH, M...
Zero Surge Surge Suppressors Homepage
How to wire Ethernet Cables
View Quotes - www.chrisbeach.co.uk
SourceForge.net: pcapsipdump
Linux initial RAM disk (initrd) overview
SquidFaq - SquidWiki
What is Categories of twisted pair cabling systems? - a definition from Whatis.c...
SOMAP.org - Security Officers Best Friend - Security Management Tool
Main Page - Wikicars
The Chronicles of George
100% Safe Downloads - SVSDownloads.com
SVS Application Best Practices - Altiris Wiki
Altiris Juice | A Community for Altiris Product Enthusiasts
Linbox Directory Server - Trac
dvdisaster English
Happy Camel
Welcome to logreport.org
DownThemAll!
P___2804.PDF (application/pdf Object)
Processor magazine article on employees buying their own laptop
Certain Programs Do Not Work Correctly If You Log On Using a Limited User Accoun...
The Parallel Virtual File System Project
Diagnostic tools to aid in NetWare environment troubleshooting
Security Configuration Guides
Debian Linux Network Monitoring with MRTG and SNMP
My NetFlow Reporting System - Dynamic Networks
Text* Snippets: TextDrive Snippets courtesy of Peter Coopers handy little app
Security - Active Directory Security Groups for Apache Authorization
Safe Computing at the U
VM Builder
Drive diagnostic utilities compendium - TechSpot OpenBoards
Linux.com | Little-known APT utilities for Debian desktop users
UTF-8 Cygwin - Download
Firefox Portable | PortableApps.com
WinNUT - Windows Network UPS Tools
LDAP Authentication on Debian Sarge HOWTO
Welcome to NANOG!
CrunchyFrog - Database schema browser and query tool
leads4web/4
Conc
concentrator
Podiobooks.com - Serialized audio books in podcast form
PHP encryption for the common man
FreeSWITCH.org :: Open Source Telephony Project
WindowsDevCenter.com -- Registry Hacks for Servers
JGoodies :: Freeware
Asterisk UNISTIM channels - voip-info.org
A Technical History of Apple"s Operating Systems: Introduction
Penguin Feet Content Filtering System
Cell Phone Wireless Recycling, Ink Toner Cartridge Recycling, Fundraising - Recy...
VGA USB 1394 FireWire EVC keyboard monitor mouse port pinout, RS232 DB9 DB25 pin...
Top Ten Tricks and Tips for New IRC Users
Tranglos software: KeyNote
Duplex Issues
TCP Tuning Guide - TCP Tuning Background
nonadmin - Home
CSPP-54015 Advanced Network Design
PERM Project
The Hercules System/370, ESA/390, and z/Architecture Emulator
CPUG: The Check Point User Group
Welcome to INFOMINE: Scholarly Internet Resource Collections
Principia Discordia - S23Wiki
Principia Discordia | the book of Chaos, Discord and Confusion | Fnord!
FNORD
Employment Opportunities
webcast.berkeley | Courses | Schedule
AudioSkin™ Cable Organizer
TECHtionary :: World"s First and Largest Animated Magazine on TECHnology
History of LISP — Software Collection Committee
Linux Reality
Plagger - Trac
Microsoft Virtual Server 2005 R2
free
About GloMoSim
Main Page - Nsnam
Telephone Terminology
Glossary of ISDN and Telephone Terminology
Ohloh
Linux.com | CLI Magic: Creating basic front ends with dialog and Xdialog
OpenOffice Writer: Creating powerful lists using styles
PITA
MDLog:/sysadmin
Endgame:Singularity; an original simulation of a true AI
Rosegarden: music software for Linux
Info-ZIP"s Zip
Iceman1"s KSQLAnalyzer
ncc homepage
How to restore a hacked Linux server | MDLog:/sysadmin
Work at home, home office and telecommuting marketing consultant speaker and exp...
The Chief Home Officer on Squidoo
O"Reilly Network -- Data Protection for LAMP Applications
HotOSS | organize and share OSS notes
NetSmartz.org
Debt Collection Practices: When Hardball Tactics Go Too Far
Fair Debt Collection
Designed in California | An Apple reference
WindowsDevCenter.com -- Best Windows Admin Downloads
Aardvark Digital 2006 - Periodic Table - Education
Telnet Password on Cisco Router to Avoid Error Message Configuration Example [C...
Sysinternals Freeware - BgInfo
Catalyst 4000 Series General Setup
Catalyst 4000 Series Port Setup
Configuring EtherChannel
Cisco Repair - BradReese.Com
Using PortFast and Other Commands to Fix Workstation Startup Connectivity Delays...
Trunking Between Catalyst 4500/4000, 5500/5000, and 6500/6000 Series Switches Us...
Software Configuration Guide (5.5) - Configuring VLANs [Cisco Catalyst 5000 Ser...
Networking: Cisco 2950 VLAN problem
Configuring Ethernet Switching
[cisco-voip] T1 dropoffs.
QoS Cisco - voip-info.org
ScanTool.net - Products
Field Notice: IP Phone in Loopback May Cause VLAN Instability [Cisco 7900 Serie...
How To Configure InterVLAN Routing on Layer 3 Switches [Layer-Three Switching a...
Cisco - Creating Ethernet VLANs on Catalyst Switches
Introduction to VLANs
Routing between vlans | 911networks.com
Password Recovery Procedure for the Catalyst 4500/4000 Supervisor Engine II+/III...
CommonCiscoCommands | Engcomp | TWiki
VLAN management on the Cisco 3524
C and C++, Perl, Networking and more: MAC vendor check
WANdoc Systems
Cisco Quick Tips
PsyncX - Free Backup Software for Mac OS 10
Change Control Manager
unixgu.ru :: advchk
Net Integration Technologies
T R E M U L O U S
How to install a Cisco Router / Firewall
i-doIT
WepDecrypt
SmokePing - About SmokePing
From the creator of RRD. Latency Graphing
OTDRoadmapFinal.pdf (application/pdf Object)
FoxyProxy :: Mozilla Add-ons :: Add Features to Mozilla Software
Net Observer: Blog Travels through a Cisco World
The ELOG Home Page
Cisco - Troubleshooting Cisco Catalyst Switches to NIC Compatibility Issues
BixData | Cluster and Systems Management
Guessnet
OpenDNS | Providing A Safer And Faster DNS
You Had Me At EHLO... : More on Exchange 200x SRS + SRS troubleshooting tips!
Imagination Cubed
Conky - a light-weight system monitor
Virginia jobs - Virginia Beach jobs - Norfolk jobs - Chesapeake jobs - Richmond ...
USAJOBS - The Federal Government"s Official Jobs Site
vmount
GUIdebook: Graphical User Interface gallery
Notice: Illuminated Fault LED on Hot-Plug Parallel SCSI Hard Drive May Not Indic...
Notice: Troubleshooting Process for Parallel SCSI Hard Drives Configured in a Pr...
TaskList.org - List of Windows Proccesses and Descriptions
HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer
Prelude-IDS - The Hybrid IDS framework
BuilderDepot | MegaStore
Lightning Photography pictures photographs weather picture photos photo tips pho...
Scan, copy and fax with your camera phone or digital camera
Free Fantasy Football From Fleaflicker.com
Basic journey of a packet
Frugal For Life: tips:Ants, Bathrooms and Urine Stains
Top 6 Uses for Vinegar that will Save You Money - Frugal - Families.com
Frugal For Life: Poor Man"s Meals
Electronics: An Online Guide for Beginners - Home
Debonaras - Main / HomePage
O"Reilly Network -- What Is a Wiki (and How to Use One for Your Projects)
PHP GEN: Homepage
Index of /~jgoerzen/dfs
A.G. Edwards & Sons, Inc.
tftpd32.exe: a small free multipurpose server including DHCP server and TFTP ser...
System Administrators Toolkit: Migrating and moving UNIX filesystems
Welcome to Granite Digital
Postmaster.Info : Troubleshooting E-mail Delivery
[unisog] Nortel VoIP phone configuration with ISC DHCP
vendor class identifier
NetDirector.org - Home
Blog O’ Matty » Viewing VMWare ESX server configuration data from the command li...
Dr. Dobb"s | Quick-Kill Project Management | June 30, 2006
Postfix Monitoring With Mailgraph And pflogsumm | HowtoForge - Linux Howtos and ...
UMTSmon
does it support evdo
Barcodepedia.com - the online barcode database.
QDB: Quote #244321
QDB: Quote Database Home
Office Depot - Office Supplies, Furniture, Technology
jakilinux.org - english version » SSH tricks
Sendmail Performance Tuning for Large Systems
Civil Netizen Official Download Site - A free, personal file transfer program fo...
GeoFront Webhosting | Services
DNS Hosting, domain name management and registration, dynamic DNS, secondary DNS...
EveryDNS.net is Reliable Free DNS, Static DNS, Dynamic DNS, URL Redirection, and...
Secure DNS hosting and mail services from DNS Park
The Public DNS Service
Free DNS service - Easy, web-based domain manager - ZoneEdit.com
About the K-Lite Mega Codec Pack
Bundle of codecs
The KForge Project
T2t - text to table
OGMRip
TrackStudio -- Hierarchical Issue Tracking, Bug Tracking and Defect Tracking Sof...
Pinot, a metasearch tool for the Free Desktop
Google Cheat Sheets (Version 1.05)
The Windows XP Command Line, Batch Files, and Scripting
Infosecwriters.com
The Lazyadmin.com
ATA-over-Ethernet enables low-cost Linux-oriented SAN
Kernel Korner - ATA Over Ethernet: Putting Hard Drives on the LAN | Linux Journa...
AoE (ATA over Ethernet) Specifications
Linux.com | Reduce network storage cost, complexity with ATA over Ethernet
CDCheck - CD checking and recovery software
Remote Administration For Windows
Main Page - HowardForums Wiki
Welcome to BitPim
s5vi"s homepage
Welcome to MotoModders.net
razr
Oracle9i Database Concepts -- Contents
carnarvon.tigris.org
Silmarill
ttyrpld - TTY replay daemon
Redimido - NTLogon
PHProjekt - an open source groupware suite
Flightview ::: Homepage
FireMaster 2.1 - A Firefox Master Password Recovery Tool »
Airfare Predictions, Find Cheap Airline Tickets - Farecast
Eight key tools for Oracle apps developers
Getting Ready To Send/Receive Email On Your BlackBerry Device (Part III) (Tips)
Getting Ready To Send/Receive Email On Your BlackBerry Device (Part II) (Tips)
Getting Ready To Send/Receive Email On Your BlackBerry Device (Part I) (Tips)
NetworkManager - Linux Networking made Easy
Blog O’ Matty » Monitoring Linux servers with procinfo
Blog O’ Matty » New version of ldap-stats.pl released
Relay: Ajax Directory Manager
Freevo | Freevo
EH.Net Encyclopedia: History of Property Taxes in the United States
The New York Times on the Web: Glossary of Financial and Business Terms
Stephen"s Oracle Blog
Stephen"s Oracle Blog: Does Oracle cache the SYSDBA password?
Principles of Orchestration On-line - Northern Sound Source
Ruminations on Turning 43 - O"Reilly XML Blog
Gnash - The GNU Flash player - Summary [Savannah]
Rugg - Crash test for your hard drive
Thin Client - Citrix and Terminal Services Resource Center
Tokeshi.com :: Citrix Support :: Thin Client Support :: Terminal Server Help
Terminal Services resource site
Squid Performance
bit out-of-date but still useful
» Vulture
Open/Free Realty - Free Real Estate Listing Software
The LISA Project
FreeBSD 6.0 to 6.1 binary upgrade
DODwireless-policy.pdf (application/pdf Object)
NetIQ: ADcheck - An Essential Part of Your Active Directory Toolkit!
HOWTO Rip DVD Movies To Your iPod Using Free Software
Research Systems Unix Group: radmind
Stopping spam with the Anti-Spam-SMTP-Proxy (ASSP)
SSHproxy
krd -kde remote desktop manager
IAM Homepage
ftp.proxy - FTP Proxy Server
SQUID Frequently Asked Questions: Communication between browsers and Squid
rdesktop: A Remote Desktop Protocol client
Apache::ProxyConf - Generate Proxy Configuration for browsers. - search.cpan.org
Cultured Perl: Intro to cfengine for system administration
Main Page - Cfwiki
BigAdmin Feature Article: Centralized Host Configuration With Cfengine, Part II
Turtlecase.com
pSeries and AIX Information Center: Mail queue management
Getting Things Done
System Administration: One Step toward the BIND | Linux Journal
Linux Terminal Servers for Any Business | Linux Journal
The SDF-1 gallery
healthfinder® - your guide to reliable health information
Network Monitoring Tools & Resources - Tutorials - Software - Shareware - Freewa...
NETSYS.COM - The Intelligent Hacker"s Choice - Interscan Tips & Resources (anti-...
BuzzMachine: Dell Archives
DNSHistory | Dee and Steve"s Web
DAG: Dstat: Versatile resource statistics tool
MetalheadWs: tgrep
IkeWiki
xen-tools.org - Xen Software: xen-tools
AirSet - Shared Online Calendars, Contacts and Lists for your Family, Work and S...
TestDisk - CGSecurity
Métamorphose File -n- Folder Renamer - Main
OpenBlueLab.org
fetchconfig - Fetch Configuration
Hands-On How-To
Nail Meetings Down Tight - lifehack.org
About the Rosetta Project — About the Rosetta Project
Deckplans.com - Deck plans for pool and custom decks
Welcome to the LIMSource, the premier information resource for Laboratory inform...
Debating the usefulness. The site is slightly crowded
pm20060621.png (PNG Image, 550x410 pixels)
LIMS Finder: best site for laboratory informatics, LIMS products, LIMS news, LIM...
Welcome to Bika lab systems — Bika Lab Systems
Flow LIMS: Flow Cytometry LIMS
GnosisLIMS
Bioinformatics.Org: Project Info
HalX - Free-source Laboratory Information Management System (LIMS) software
Laboratory Information Management System(s)
NIST Computer Security Division"s CSRC Home page
The Advanced Research Corporation ®
Nikto
How to build your own backyard deck - Lifehacker
Java SE Downloads
BackupPC: Open Source Backup to disk
Open Source Requirements Management Tool
squint - sqnt
How to use your Tapedrive
Identifying different iPod models
Mozilla Firefox Cheat Sheet
Classic Texts In Computer Science
Diet Tips or How To Lose Weight with a Spreadsheet and a Web Site (by Jeremy Zaw...
The Hacker"s Diet
yersinia...
Sendpage
NewsForge | Contributing to FLOSS projects
Linuxdelta: Knowledgeroot
Introduction to linSmith
fatalmind.com | software | ha-tools
Squidalyser 0.2.5
lbd-0.1
checks for load balancing
Computer Science Club of the University of Waterloo: Home
Blog O’ Matty » Securing MySQL installations with mysql_secure_installation
Frucall: Online Comparison Shopping Web site for Mobile Shoppers
Getting Through Customs - Articles
Installing East Asian Language Support Under Windows XP
Debian Backports
Secure Linux/UNIX access with PuTTY and OpenSSH
Pretty pictures
Alkyproject.com - bringing Microsoft Windows programs to Linux and Mac!
Standards and specs: The Interchange File Format (IFF)
UnixLite - A LightWeight Unix Operating System Written in C++
developerWorks : AIX and UNIX : Technical library view
Solio - Portable Hybrid Solar Power Charger
Solar power charger
Google U.S. Government Search
Wow
QEMU
SourceForge.net: VNCTracker
SourceForge.net: DVDripTools
darkstat
MyChineseFlashcards: an open source software for learning, memorizing the 1000 m...
SourceForge.net: XenMan
Best Practical Solutions, LLC: RT: Request Tracker
The helpdesk software
Zeppoo
IBISEYE.com - Your Hurricane Information Center
Lyrical Legacy (Library of Congress)
IT Recruiting and staffing services from TEKsystems
EcoGeek - Home
Netview Staffing
DNS: The Bind Leading the Bind | Linux Journal
DAT - Directory Analysis Tool
maybe Active_Directory
NFSwatch
mysfitt.net :: Syslog-ng Splunk 2.0 FIFO Howto
Tip of the Trade: Bandwidth Monitor NG
Snare EventLog Agent for Windows - Event Log transfer to Snare & Syslog servers ...
Splunk Base
How to recover from a corrupted registry that prevents Windows XP from starting
Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM
DABCC Download FREE Download – ICA and RDP Bandwidth Analysis Tool
DABCC Download Free Citrix / Terminal Services Reboot Tool - Centralis Centinel ...
Opengear - Console servers, serial over IP, and secure desktop management consol...
500 bucks for an 8 port serial console. Wow
EarToner
iSAKwiki - Open Source - Internet Secure Access Kit - Sheild Your Network Withou...
Nifty Roll of squid
Inflight Power Recharger Cables
NewsForge | How to use VMware Player to create your own images
DBench and friends
CAIDA : home
bing
Bruce A. Mah: pchar
Setting up a nagios screensaver
Using the scadm Utility
alphaWorks : IBM Autonomic Task Manager for Administrators : Overview
Project Management Institute (PMI) - The largest project management association
XPlanner Home
Welcome to CERT!
Superuser do for Limited accounts under Windows XP
SAP High Availability for Idiots
Basic Negotiating for Fun and Profit by Steve Pavlina
Armangil"s podcatcher
ExaVault - Remote Backup Supporting Open Standards (rsync, sftp, ftp) and All Pl...
A company offering remote backup
NasBackup :: Backup to the network
cwRsync - General - ITeF!x Consulting
psad
FreeBASIC compiler (a free BASIC compiler) - official page - About [en]
FrontMotion"s Firefox Community Edition
ActiveDirectory version of firefox
Print Migrator 3.1
CRONw - CRON for Windows
Vintela Resource Central - Using VAS with Samba
GetGnuWin32 – Maintaining a Gnuwin32 Package archive
PuTTY: a free telnet/ssh client
Xming Notes
NPR : Podcast Directory
IsiSetup - APT for your config
Wireshark: Welcome
Ethereal
OSRC: The Operating System Resource Center
Electronic Check Conversion
Kings and Queens of the United Kingdom
The Privacy Ecosystem (™ pending)
A P R E S S . C O M
X-Deep/32 X-Server - Interoperability Solutions
The Debconf Programmer"s Tutorial
freshmeat.net: Project details for NVnetbackup
squidGuard - An ultrafast and free filter/redirector/access controller for Squid
DansGuardian - True Web Content Filtering for All
Poesia Project
iftop: display bandwidth usage on an interface
ivarch.com: Pipe Viewer
Consolidation Comparison - home
Western Digital Loyality Program
Seagull: an Open Source Multi-protocol traffic generator
msi2xml - Windows Installer Package to XML Bi-Directional Converter
MSI-Repackaging
smf-zombie :: Sendmail Zombie SPAM Blocker
The Post Punk Kitchen: Vegetarian cooking & vegan baking with no attitude
Hiking in Colorado - www.hikingincolorado.org
The Cast Iron iA3000™ integration appliance enables companies to integrate appli...
I wonder why webmethods never did this?
Consistent backup with Linux Logical Volume Manager (LVM) snapshots | nixCraft
Netdisco - Network Management and Discovery
TeraTerm 3.1.3 - Telnet, SSH2, SSL Client with built in Web Server
Tera Term Home Page
Remastering DSL: A Short HOWTO with a Long Preamble - Linux Forums
Vacations
Wolfpack Empire - Reasons to Play
all about the sheep
TUI White Papers
Hack Tales: E-mail archiving the home-brew way | InfoWorld | Analysis | 2006-05-...
Worldlabel.com - Laser Labels, Inkjet labels, address labels, avery® labels, mai...
The Cool Colors Project
Slowlane.com Stay-At-Home Dad Stay At Home Father Resource
Landscaping for Energy Conservation
Putting Trees to Work | THIS OLD HOUSE
Pipemeter
Synbak | InitZero S.r.l. - IT Solutions
CLISH: Main Page
How do I explain this other then cool
Coda File System
Lotus Notes Calendar FAQ - Faculty/Staff
good end user oriented help
LDAP GURU - Do it right the first time around.
BUILDYOURMEMORY.COM / A mnemonics and memory improvement resource
Windows Live Safety Center: Free online tool for PC health and safety
Linux Timeline | Linux Journal
Download Now: The Free iPod Book 2.0
Sloppy - the slow proxy for dial-up modem speed simulation (slow down)
Bandwidth Calculator, Byte Converter, Bit Calculator - Edoceo, Inc.
NLANR/DAST : Iperf 1.7.0 - The TCP/UDP Bandwidth Measurement Tool
Multi Distro
9 livecds in 1
Brain Burps : IT Capabilities Assessment: free download
NewsForge | Getting started with Wacom tablets in Linux
Zenoss : Home : Open Source Network & Systems Monitoring
Computer Medics of Suffolk
Installing and operating the SAP NetWeaver J2EE Preview
Shell Scripting Primer
Viruslist.com - Analyst"s Diary
Mp3dings
Nessj
start [OpenVAS Project DokuWiki]
Winpooch : Windows watchdog helps to detect spywares and trojans - opensource - ...
Cheap Airfare, Hotel Reservations, Car Rentals - Kayak.com
USB Adapter for CardBus Wireless Modem Cards
Linux, Unix, /etc: The Unix Philosophy
The DevCon command-line utility functions as an alternative to Device Manager
Linux.com | Super-speedy KDE keyboard shortcuts
Bartlby - Next generation of system and network monitoring
RoombaDevTools.com - The place to get all your development and hacking tools for...
Microsoft Exchange Server resource site
Creating Passionate Users: How to be an expert
Cornell Note Taking Method
Bash tutorial
WikiMatrix / Wiki Feature Comparison - Compare them all
FullSync - Home
iSubwayMaps - New York, London, Chicago, San Francisco, Boston, Washington DC Su...
.: UNEASYsilence :. » How-to: Backup Del.icio.us to Gmail
Belcan Corporation
GCALSYNC - synhronize your phone with Google Calendar
FS24-7ltd - A network of IT professionals, engineers and technicians
Computer Specialists Inc. (CSI) - Home
Basic Library Lists - Mathmatics
Common Lisp the Language, 2nd Edition
How to Design Programs
Welcome to the SICP Web Site
FreshBooks - The Fastest Way to Invoice Your Clients
ProcessID Home Page
Appliance Parts from Repairclinic.com - HomePage
APA Research Style Crib Sheet
Portable Rackmount: Portable Server Racks and Cabinets from Rackmount Solutions
9800 Free Fonts, fonts for free, font finder, download free fonts, free typograp...
Home - iFolder
Small Enclosures - techrack.com - TechRack Systems
JDiskReport
LDAP Account Manager
PKR | internet - Taskjitsu
www.lookatlan.com - Network Monitoring and Management Solutions
Unboxing.com
WikiStartEn - Linbox Rescue Server - Trac
31tools.com : ShareToDo
freshmeat.net: Project details for Mathematical Backgrounds
Corporate Information Technologies - Cisco, Citrix, 3Com, Nortel, Linux, and Mic...
nFusion Technologies, LLC - A Computer Hardware, Data and Network Systems Integr...
AddPrinter
Nifty add printer batch file
SAP Help Desk - SAP Help Desk
PBNJ - (P)orts (B)anners N" Junk
HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer
Rogue Scanner
Seige
Testing webservers
SOFTCARE INC.
Online IP CIDR Calculator
Automate Linux Installations with Debian Pre-Seeding
MySQL Cheat Sheet
Browser Security Test
BogoSec: Security Quality Metric
www.crm-ctt.com: the CRM-CTT Project page
OSSEC HIDS - Open Source Security
Squid spyware detection.
HT Editor
Linux/Unix nbench
Memtest86+ - Advanced Memory Diagnostic Tool
Getting Metasploit to run on a Linksys Router - Hackingdefined
FairuzaWRT
SANS™ Institute - Computer Security Education and Information Security Training
Extending MythTV recording space with LVM - O"Reilly Digital Media Blog
GNU Screen - GNU Project - Free Software Foundation (FSF)
Mooch | Abcde
How To Set Up A Loadbalanced High-Availability Apache Cluster | HowtoForge - Lin...
Tail Server - Home Page
tail via telnet
http://lite.ipanto.com
IP address management
InstallJammer - A free, open source, multiplatform installer and builder - Home
jMemorize - Learning made easy (and fun) - A Leitner flashcards tool
OracleEditor.php - Oracle Record Browser and Editor in a single PHP script
Perl Audio Converter (PAC)
IBM Software - Lotus Notes access for SAP solutions
Articles at Epicurious.com
Welcome to GPC News
SSH Proxy Command -- connect.c
deep-ssh
multiple SSH connections
cURL - Tutorial
Interesting reading
VZAccess Manager - Product Search
Whitedust: Understanding Basic Cryptography
Ethical_Hacking_RHartley.pdf (application/pdf Object)
FTester - Trac
fsh -- Fast remote command execution
Scalar
MuniWireless » Blog Archive » 3G/EVDO services not designed for true Internet ex...
The truth comes out. :)
Pete Finnigan - Oracle and Oracle security information
Foofus Networking Services - Medusa
www.GomoR.org: sinfp
In the Trenches
ITT Wiki : Home Page
ITT Wiki : How To Calculate UPS Load For UPS Purchase
Ive been looking for something like this for a long time.
Linksysinfo.org - #1 In External Linksys Support - Content
GigaOM : » The Myth, Reality & Future of Web 2.0
Firefox 1.5 CCK (Client Customization Kit) Wizard
Web Polygraph
DCRP Review: Canon PowerShot S2 IS
PowerShot S2 IS Top Page
American National Standards Institute - ANSI
Serial ATA
System performance benchmark
Mondo Rescue - GPL disaster recovery solution
Debian Administration :: Search and replace across many files with a perl one-li...
Virus Bulletin : Independent Malware Advice
VIRUSTOTAL - Free Online Virus and Malware Scan
AV-Comparatives
CIO Blogs - Tips on the Interview, Skills in Demand and Compensation for IT Job ...
Salveson Stetson Group, Inc.
Ktctool
Download details: Microsoft Baseline Security Analyzer v2.0 (for IT Professional...
V-Grep
Flexbeta - A Guide to Bittorrent
EDI Specs
Ford
sector 7g - PDFCreator
Sean’s Obsessions
Expose Web performance problems with the RRDtool
echoping Home Page
Torpark
Pod CityGuides: Download for FREE
flat assembler
BasicQuery SourceForge Project Homepage
oz2remind
Oggify/Goggify
MSORT
Sussen
WebInject - (HTTP) Web Application and Web Services Test Tool - Nagios Plugin
English grammar - freeTutorials Learning pages - 5-column-system -language schoo...
Advanced techniques for using the UNIX find command
MonAMI
The Hobbit Monitor
Notesgirl : Libby"s Spot
How to Write a Helpful Bug Report
popurls.com | popular urls to the latest web buzz
Home Page of John Nemes
ntop - network top
Argus - Home
WebHome - NTP
1383.pdf (application/pdf Object)
3183.pdf (application/pdf Object)
Vipul"s Razor: home
Postfix Configuration - UCE Controls
Tail for Win32 - Home Page
EtherApe, a graphical network monitor
Garbage Pail Kids World
Traders" Glossary A-C
gada.be
FrontPage - Debian Wiki
Gentoo Linux Documentation -- Keychain
a vsftpd guide and tutorial - vsftpdrocks.org
vsftpd - Secure, fast FTP server for UNIX-like systems
BSI : Software : chkconfig
Food and Nutrition Solutions Series | University of Illinois Extension
Home Resource Efficiency
How to "chroot" an Apache tree with Linux and Solaris
OCS Inventory NG
Debian notes
Linux.com | CLI Magic: Using script to log your sessions
NewsForge | Defeat spam with SpamBayes
MTR
view packet loss at each hop
CivicSpace | A free/open-source community organizing platform
NewsForge | Three rules for safer Wi-Fi away from home
Mantis Bug Tracker
Linux.com | Convert any video file to DVD with open source tools
9-1-1 National Emergency Number Association | The Voice of 911
LinuxDevCenter.com -- Managing Disk Space with LVM
iana-etc . projects . seth w klein
OPEN-XCHANGE : The Collaboration and Integration Server Environment
The Prefix WhoIs Project - WhoB & Layer Four Traceroute (LFT)
FrontPage - Ketchup
ipcam - motion detection and recording program for IP camera"s
guidod - mksite - website look and feel generator
OpenOffice.org Training, Tips, and Ideas
voip-info.org - voip-info.org
Documenting Your Network - Network Services, MOREnet
NagVis - Nagios visualisation addon - Homepage
NagiosExchange: Categories: AddOn Projects: Downtimes
Ssh framework - neuntoeter
Socialist Sushi » portaPuTTY
Winpooch : Windows watchdog helps to detect spywares and trojans - opensource - ...
xpy
Need to look at this
My Fiendish Master Plan
helpdesktalk.com
MySQLForge
Network Protocol Specialists, LLC
SNIA - Storage Networking Industry Association: New to Storage Networking?
Americas
Stanford"s NEW Netspeed Server NDT server
Riverbed Technology
Neat technology
The Burning Man Project :: Welcome Home
Welcome to your Network Nightmare!!!
Neat
Cisco VPN 3000 Series Concentrators Configuration Guides - Cisco Systems
RRDtool - rrdtutorial
AstroGrep
Oh my! Grep for Windows. Grep for Windows
Linux.com | Moving to PDF as a future print job spooling format
InitNG - Trac
About mp3togo
ITNW 1325 - Fundamentals of Networking
Catch (But Don"t Release) with Squid Web Proxying
Linux.com | How to configure a low-cost load-balanced LAMP cluster
CK-ERP InfoWeb: General Description / Demo Site Entrance
Projekty
Main Page - Aircrack-ng
kbarcode.net: Home
RSP Monitoring Tools: Personal Edition
AbsurdlyCool Freebie Finder
Blog O’ Matty » Debugging TCP connections with tcptrace
Website Monitoring
SQLiteManager - Accueil
Smoot Web-based Ajax Diagram and GIS tool
Wiki on a Stick
Xealous Nets
Subnet Calculator
Cfengine - an adaptive configuration engine
Seed7 Homepage
PerlSendmail
Debian Administration Utilities - Every Debian Admin needs
SICM - Simple Infrastructure Capacity Monitor
monit
AFD (Automatic File Distributor)
Cacti: The Complete RRDTool-based Graphing Solution
eb0482.pdf (application/pdf Object)
Rain Barrel Info and Sources for the Pacific Northwest
Sunset :: Travel :: Life in the West
Introduction to DFS
Debian From Scratch
Scientific Linux - Welcome to Scientific Linux (SL)
Caching Tutorial for Web Authors and Webmasters
General Caching Guide but I still relate it to Squid
Cacheability Engine
Transact...
Having problems with your SAP adaptor receiving from your SAP server
To do list, simple, easy, fast, sharable: Ta-da List
Raible Designs ~ We Build Web Apps
Cisco VPNs with the Sharp Zaurus
vpnc - client for cisco3000 VPN Concentrator
SAPadministration.com :: View Forum - SAP Basis / Web AS Administration
How to set up an Ethernet over USB connection between the Sharp Zaurus SL-5000D ...
Unofficial Zaurus FAQ - OESF
All the SAP Online Help in PDFs - Very Easy to Find - A Really Good Tutorial ...
All SAP Transaction Codes with Report and Description
Transaction List
Gourmet herbs, spices, essential oils, potpourri, green tea, catnip - bulk and w...
Public Proxy Servers
Internet FAQ Archives - Online Education
An introduction to MSDOS
batch file commands
onfocus.com | Add a batch of dates to Google Calendar
DSH - dancer"s shell / distributed shell
johnnygizmo - getCals
Geek Pit
Geek Pit: Five-Minutes to a More Secure SSH
CSS Navigation Techniques (36 entries)
100 Science Facts
Shopping List Compendium - Collection of Abandoned Grocery Lists
Home ( DNN 3.2.2 )
ipodjuice.com - change ipod battery replacement battery in 1st second 2nd third ...
Get More Interviews With a T-Letter
I started using this format for my coverletters some time ago. Never really though of it as unique or special. Oh well.
Font guide for webmasters
Welcome to MusicBrainz! - MusicBrainz
WWII German Translation Guide
Welcome to Crawlspace Doors!
The Geekery - Home
Ben Fenster - Classes & Schedules
This guy just has an amazing amount of notes. I wish I was that organized. :)
ACCT E-120 MANAGERIAL ACCOUNTING Home
Joe Brazel"s Web Page
The Math Forum @ Drexel University
VoIPowering your Office with Asterisk—Building a Test Lab, Part 3
VoIPowering your Office with Asterisk—Building a Test Lab, Part 2
VoIPowering your Office with Asterisk – Building a Test Lab, Part 1
Demystifying Regular Expressions - The Linux Information Resource
oob-remote-management.pdf (application/pdf Object)
Zonker"s Greater Scroll of Console Knowledge
Conserver
Legal Case Management
sysstat utility
[Geeks are Sexy] technology news: Freeze your hard drive to recover data: Myth o...
And everyone looked at me like I had lost my mind when I said this would work. :}
yorkspace.com » The Dell De-Crapifier
Rockbox - Open Source Jukebox Firmware
intp.org
O"Reilly Network -- Using Solaris SMF
Build a Secure Logging Server with syslog-ng (Part 2)
Build a Secure Logging Server with syslog-ng
DebCentral - The Center for all things Debian based
File Permissions - The Linux Information Resource
Cufflinks for men,women at discounted cheap prices,silver cufflinks,wedding cuff...
The Budgeting Babe: Can paying off debt hurt your credit?
moreutils
WebInject - (HTTP) Web Application and Web Services Test Tool
Books for MacOS X
Welcome to DenyHosts
OpenSyncro, opensource EAI software for Java, Tomcat & MySQL platform
LinuxTracker :: Linux BitTorrents
Apple - Support - iPod - The Five Rs
Re: Help, my printer port is on fire!!!
VNCCasts
iCalShare - Share Your iCalendars!
Like Merchant Ships: No Flour Brownies
SMC Barricade notes
tws-v3n2.pdf (application/pdf Object)
Search and Download Oracle Database, Application Server, and Collaboration Suite...
Product Technical Notes
Performance Documentation some of it is dated
The weblog of Nathan Lee
I want a Freeware Utility to ... 300+ common problems solved : eConsultant
Sendmail Configuration Settings Unmasked!
Homepage of ZABBIX :: Open Source Application and Network Monitoring Solution
Poet at Work: Walt Whitman Notebooks 1850s-1860s - (American Memory from the Lib...
A Taste of Gardening - University of Illinois Extension
PlainDoc (pd2tex) Home
Evolutionary Timeline
Google Calendar
The google juggernaut (googlenaut?) continues on.
HOWTO Keep a network of Debians up-to-date - BeezNest
Linux // Debian GNU/Linux on a Dell D610
DNS Stuff: DNS tools, DNS hosting tests, WHOIS, traceroute, ping, and other netw...
tnscmd
Welcome to Pentest Limited
Mailmgr
SARG
ServersCheck - - MIB Browser - Freeware
Free?
The Cult - ChuckPalahniuk.net
Fight club
Apcupsd, a daemon for controlling APC UPSes
Download Java 2 Platform, Standard Edition, v 1.4.2 (J2SE)
Box Backup
Re-examining the Suitability of the Raised Floor for Data Center Applications (a...
Lennie Lightwave"s Guide To Fiber Optics - Jargon
Basic Steps in Forensic Analysis of Unix Systems
FORTUNE 500 2006
About You
Lowepro - Home
openCRX - Limitless Relationship Management
20 ways to Secure your Apache Configuration
Service Management Software - service level management background
Pekarna / Seek & Destroy Music Duplicates
FreeRADIUS -- building the perfect RADIUS server
NirCmd - Freeware command-line tool
MX Lookup Tool - Check your DNS MX Records online
Souptonuts: for detailed notes, click on my notes
HipCal - it"s about time
BigAdmin Feature Article: Resources for Running Solaris OS on a Laptop
Sun Microsystems - BigAdmin HCL: Solaris Operating System for x86 Installation C...
Wideman Comparative Glossary of Project Management Terms v3.1
stu nicholls | CSS PLaY | experiments with cascading style sheets
Unix Admin Corner: Why are installs so Slow
Welcome to the 21C Hotel
Router man
» E-mail security: detecting spam (II) » Becoming paranoid » Tips about computer...
import this. » Blog Archive » IPCop-OpenVPN HOWTO
Cascading Style Cheatsheet
Learn CSS Positioning in Ten Steps
Install PHP5 Apache MySQL on Windows : WAMP5
Geek to Live: Set up your personal Wikipedia - Lifehacker
www.centos.org - News - CentOS in the News - It"s L-i-n-u-x, that is an Operatin...
Jobby :: Web 2.0 Style Resume and Skills Tracker
SFBags - WaterField Designs - Home Page
Activity Manager overview
CIO Blogs - Why IT and Users Hate Each Other |
Graphviz
Wired News: Steve Jobs" Best Quotes Ever
Timeline of Apple Macintosh models - Wikipedia, the free encyclopedia
SVG documents label templates using XML
Crutchfield.com - Digital Drive-thru
why_phishing_works.pdf (application/pdf Object)
HP.com - ProLiant networking - Support & Documents
OSSEC HIDS - Open Source Security
thoggen - DVD backup/ripping with style
Apple - iPod - Download
Mandriva Linux Documentation Project: Borges
di - Disk Information Utility
/home/david :: Scripts
Feeding America
T E X T F I L E S D O T C O M
altinity.org
altinity.org: Lessons in .... SNMP trap handling
Super Proxy Script
Good example for load balancing
TriOptic Barcode Labels
Nuxified Forums :: View topic - Roll Your Own Firewall
Solaris - first install
Zaurus Debian TCL howto
Linux.com | Snort on OpenWrt: Guarding the SOHO perimeter
Network UPS Tools
OpenQRM - Open Resource Manager - Home
Is Your Data Encryption Really Secure
IBM Redbooks | IBM TotalStorage: Implementing an Open IBM SAN
Simpson Crazy | Downloads | Simpsons mp3 music
HP Surestore 15 Slot with DLT7000 series - HP Surestore Tape Library - DLT Libr...
OpenGuides
Keepass for Linux (Keepass/L)
KeePass - The Open-Source Password Safe
SSH without password : micro HOWTO by Arun Vasan @ Univ. of Maryland
How to bypass your BIOS Password
Ultra High Security Password Generator
tvRSS - Syndication for your television
Prepping /dev/random in FreeBSD
SquidRestrict - Time Restrictions for Squid
aria2
Rover
Schedule tool for remote access to multiple pcs.
Manpage of anyfs-tools
BASH with Debugger and Improved Debug Support and Error Handling
Ryan"s In/Out Board
Ive seen these done with magnetic boards. Always seemed like something which should be done in software
sharehound
file system indexing
Nautopia: LiveCD Collection
put multiple live cds on a dvd
VoIPowering Your Office with Asterisk – Part 1: Introduction
Frontier: Elite 2 web site
Frontier First Encounters: Alioth Network
Elite - Second game to capture my attention
iPod Diagnostic Mode
IDEMA | The International Disk Drive Equipment and Materials Association
Wire Your House How To
Binary Expressions » Daddy’s Rules
Rands In Repose: Status Reports 2.0
Your Credit Score: How It All Adds Up
Rebels: Painters and Poets of the 1950s
Brochure "ABC of diplomacy"
Two-in-one DNS server with BIND9 | HowtoForge - Linux Howtos and Tutorials
John the Ripper password cracker
Softgun
CmosPwd - CGSecurity
Index of /GPL/ora2pg
Windows 2003 Terminal Services (Part 1)
Dell - Dell Linux - RAID & Storage
Howto remove an user and improve security - O"Reilly Sysadmin
Unix stuff
CD/DVD check tool
GnuCash - Gnucash
Browser ID Strings (a.k.a. User Agent ID)
NewsForge | Command line Perl for sysadmins
Sed - An Introduction and Tutorial
CE Information and Policy Statements
somewhat humorous
Things I didnt know you could do with vi
IEEE Registration Authority - IEEE OUI and Company_id Assignments
HP Web-Based Training
Lulu.com - Self Publishing - Free
Publishing On Demand (POD)
NetBIOS Suffixes (16th Character of the NetBIOS Name)
Working more productively with bash 2.x/3.x
Operating Systems Guides
DHCP Best Practices
BBC - Languages - Learn German
BBC - Languages - Learn French
Cables To Go: Computer Cables, Audio Video Cables, DVI Cables, USB Cables, PC to...
NEMA Chart
iPod Gym - Exercises for your iPod
Electrical Outlets by NEMA Ratings - TWAcomm.com, Inc.
Tag from sbooth.org
Plans - A Good Web Calendar
MasterShaper - Easy traffic shaping and QoS with Linux : MasterShaper
BasKet for KDE: Unstable Development Version
Network Management (ICA40399) | SWAN TAFE C122 Web Log
Main Page - Wikibooks, collection of open-content textbooks
MS Project Tutorials
Smartworks:Free Downloads
MPP2PPR converter to use Project Planner Reader to read the file. Project Planner Reader Need to blog about this
FrontPage - SWiki
FON: WiFi everywhere!
What information to prepare before calling Tech Support for Matrix-UPS fault?
cbl_best.pdf (application/pdf Object)
Cabling Documentation - Best Practices
Dell™ PowerEdge™ Rack Systems
RFC 1855: Netiquette Guidelines
My Settop Box
Linux NetMag - Linux NetMag
DeVeDe
TiddlyTasks - v0.2 for FireFox - based on TiddlyWiki v2.0.6
:: PDF Split and Merge ::
Linux.com | CLI Magic: Tracking system performance with sar
[Scripts] NTP management scripts
Network Monitoring Tools
Troubleshooting Remote Desktop Licensing Error Messages
CUE | Computer-Using Educators
DriverCleaner.net Other Tools
DriverCleaner.net Driver Cleaner Professional Edition
Your How To! - Home
Kinda weird about the adsense thing but atleast he/she is honest about it. :)
View HTTP Request and Response Header
Cacheability Query
Read Go It Alone!
SciTE4AutoIt3 Home Page
DVzine.org - The Dvorak Zine
Order your TypeMatrix keyboard online!
The Slack World, Issue 2, 2005. Slack Notes
IT Manager"s Journal | Introducing COBIT
Open Tax Solver
Presentation Zen: No excuse for tedium: Advice on giving technical presentations
Schools Save with Open Source
Network Wide Updates - Trac
Linux.com | Using versioning for your configuration files
Blah Blah Blog » Linux Terminal Server for Home Media PCs
Automate OS switching on a dual-boot Linux system
Linux.com | Implementing a Postfix mail server with spam and antivirus protectio...
Tips to Secure Linux Workstation | Ayman Hourieh"s Blog
Traditional DNS Howto | HowtoForge - Linux Howtos and Tutorials
Software in Review - Moving Windows fonts to Linux
Adminspotting.net » Stories of Spam, Part 1
ZeeMaps - Hotels and Restaurants
Restaurants, Hotels, Reviews, Restaurant and Hotel Guide - Open List, Inc. - You...
Warren County, New Jersey -- Dining
Choosing Home
Unicode in Japan
Crunch TV
Captain Crunch/ Crunchman
A smarter, but not the smartest, thermostat - O"Reilly Mac DevCenter Blog
Create an iPod Video converter cable -- For Cheap! - O"Reilly Mac DevCenter Blog
Make - Portable Skype HOW TO: Run Skype from your iPod
Andy Budd::Blogography: iTunes Smart Playlists
Upgrading to MythTV 0.19 - O"Reilly Digital Media Blog
HADSL - Home of "FirM"
Administration tool for Lotus Notes
Be smarter at work, slack off - Mar. 17, 2006
Stevey"s Blog Rants: Math For Programmers
BHV - Browser History Viewer
fsvs.tigris.org
Kilala.nl - UNIX Sysadmin
miek.nl - projects - rdup
The Perfect Linux Firewall Part II -- IPCop & Copfilter ::.. | HowtoForge - Linu...
The Perfect Linux Firewall Part I -- IPCop | HowtoForge - Linux Howtos and Tutor...
A sysadmin tip that could save you hours... - O"Reilly ONLamp Blog
Theos Soft - Handy
OOo Off the Wall: That"s Your Version--Document Control in OOo Writer | Linux Jo...
An Introduction to awk | Linux Journal
MuslimHeritage.com - Discover 1000 Years of Missing History
Scintilla and SciTE
PaperCut Software Knowledge Base - Main.ConfiguringSquidProxyToAuthenticateWithA...
InterScan VirusWall Statistics Generator - IScanSG
InterScan VirusWall patch for Debian GNU/Linux
Signal Lost
Q & A: Using Seek and Destroy Music Duplicates
Scmbug | mkgnu.net
PHP Timeclock
Books2burn
OpenBookings.org - Official Home Page
32-Bit Chroot How-To - Ubuntu Forums
Understanding The Spanning Tree Protocol (Part III) (Tips)
Copper or Fiber? What"s the real story for communications cabling?
Fiber Optic Tutorial - Basics: what is fiber optics, fiber vs copper, fiber opti...
HOW TO run two or more Nagios instances on one server
Rob van der Woude"s Scripting Pages: Batch Files, Rexx, KiXtart, Perl, VBScript
OpenQA: Home
ARP Tools [Krzysztof Burghardt"s Home Page]
eicar - European Institute for Computer Anti-Virus Research
eicar - Anti-Virus test file
bookbpdf.pdf (application/pdf Object)
developerWorks : Linux Professional Institute (LPI) exam prep
Creating Repositories and Projects in Subversion: Trunk, Tags, ...
Understanding The Spanning Tree Protocol (Part II) (Tips)
Operator v3.3.20
Darknet The Darkside
Bit9 FileAdvisor - FileName, MD5, SHA-1 Search
IBM Redbooks | IBM Virtualization Engine Platform Version 2 Technical Presentati...
Frysk System Monitor / Debugger
The Webalizer: Download
Simpletons guide to web server analysis
Free Online Spyware Scan - Trend Micro™
TREND MICRO - Free - Portscan
Trend Micro - Virus Map
Trend Micro - Free online virus Scan
DAG: Tunneling SSH over HTTP(S)
SNMP4Nagios::
Siege Home
foo2hp: a linux printer driver for ZJS protocol (e.g. HP Color LaserJet 2600n)
NirSoft - freeware utilities: password recovery, system utilities, desktop utili...
Using Wikis and Blogs to Ease Administration | Linux Journal
[Phoronix] Linux Audio Comparison
Read The Book - John Taylor Gatto
Rands In Repose: Messy Thinking
Indeed | one search. all jobs.
How Products Are Made
Studies in American Humor
The Academy of American Poets
9 tips for running more productive meetings | 43 Folders
Welcome to Boxxet
VMware Virtual Machine Importer 2.0 Beta Program
SCSI expert articles with up-to-date SCSI information: LVD, SE, HVD SCSI Compati...
scsifaq.org - SCSI Info Central
SCSI Trade Association (SCSITA)
SCSI Media Changer and Backup Device Control System
scsi connector types and pictures
::Welcome to JNYSolutions::
Description of Transport Neutral Encapsulation Format (TNEF) in Outlook 2000
RFC 2034 (rfc2034) - SMTP Service Extension for Returning Enhanced Error C
RFC 1893 (rfc1893) - Enhanced Mail System Status Codes
Style Properties
ScienceLogic - Simplify IT Management
Similar to OpenView & Tivoli Looks like the hardware is based on a Custom Dell Systems(maybe clone?).
DokuWiki [splitbrain.org]
Multiple Network Interfaces with Samba
Active Directory Samba - Waikato Linux Users Group
Cable Management Done Right
Excellent Linux E-Book Reader | Stupendous Tales
WinExtra BOSS Freeware Edition - a computer utility toolchest of goodies
Articles
HD Tune
Hardening a Linux server in 10 minutes » The R Zone
Tuning and Optimizing RHEL for Oracle 9i and 10g Databases (Red Hat Enterprise L...
Linux.com | Viewing Word files at the command line
The Screen Program - Linux Forums
Tuning an Apache server in 5 minutes » The R Zone
How to switch an enterprise to OSS, part one
Armagetron Advanced :: a Tron clone in 3D
HardwareLiSter - ezIX
wxChecksums
Niki (english)
gjots - a simple jotter for X11/gtk-gnome
UMLGraph - Declarative Drawing of UML Diagrams
LAT - LDAP Administration Tool
gtkpod - a GUI for Apple"s iPod using GTK2
Index of /~ratz/mpt-status
LSI Raid Status
CoffeeGeek - News, Reviews, Opinion and Community for Coffee and Espresso
Talisker Computer Network Defense Operational Picture
Security Pro Dashboard
Cain & Abel
Wikispaces - A Place To Grow Communities
One Bag (all about packing, luggage, and travelling light)
Main Page - Nscplus
Protection from Spyware, Spam, Viruses and Online Scams | SiteAdvisor
ONLamp.com -- System Administration with ooRexx
time management software :
JAMon - Documentation
System Manager
Manage patches across systems of all types
ffe - flat file extractor
Site personnel de Laurent Coustet (alias ed)
System Info
WiX - FAQ
Planner on Windows
Planner - Imendio Developer Pages
GNU Enterprise
Open Subscriber Home
Open: Open Source Project Management
SourceForge.net: Open Workbench
Open Workbench - Open Source Project Management and Project Scheduling for Windo...
Avoiding Vampire Meetings at blackrimglasses.com
The future of the Palm platform: lessons learned from the Sharp Zaurus (EasyPrin...
Tree Planting | NRCS
Librarians" Internet Index: http://lii.org/pub/topic/taxes
National Gardening Association
World War II Military Situation Maps - (American Memory from the Library of Cong...
Vegetable Gardening In Containers
Singingfish - the audio/video search engine
Main Page - wikiPodLinux
Encyclopodia - the encyclopedia on your iPod
System Administrators Toolkit: Process administration tricks
Download details: Windows Vista Step-by-Step Guides for IT Professionals
The Official ImgBurn Website
SourceForge.net: GTK Ora
Hitachi Global Storage Technologies | Support | Knowledge Base
debsecan
dotproject - Open Source Software :: Open Source Project and Task Management Sof...
somesound.org
WebVocab Home Page
Imperium Galactica 1.0 (Official GameServer) Login
Log4sh
phpSuperMarketTycoon
// packetfence //
joblist
Hari’s Corner » Linux system information app
IzzySoft Oracle Support
Worse is better - Wikipedia, the free encyclopedia
IT Manager"s Journal | What IT managers can learn from software developers
Thinking in Web 2.0: Sixteen Ways (web2.wsj2.com)
JACKS and PLUGS
IPMI HOWTO for Debian GNU/Linux on the Intel SR2300 (Server Board SE7501WV2)
SourceForge.net: IPMItool
The FreeBSD Diary -- Bacula - Digital DLT MiniLibrary - TL891
Welcome to LinkedIn
v12, i11: Advanced Configuration of Nagios
v14, i03: SNMP Trap Handling with Nagios
Jalenack"s AJAX Periodic Table of the Elements
The Ethical Hacker Network - Essential Wireless Hacking Tools
FrontPage - Unattended Wiki
ASUSTeK Computer Inc.-Support-
A8N-VM (CSM) in Linux
sneep
Writing A Business Plan
Linux.com | CLI Magic: Patching the differences
HowtoForge - Linux Howtos and Tutorials | The Open Source Howto Development Web ...
wiki like?
How to write a technical article - O"Reilly Sysadmin
Oedipus Web Scanner Project
SourceForge.net: PersonalBackup
npadmin
Printer tool to check status of network printers.
BigAdmin - Submitted Tech Tip: Responding to Disk Errors on Both Root Mirrors
spiralbound.net » Solaris Disk Partition Layout & Mirroring Scripts
BobCares :: Outsourced Web Hosting Support :: Configuring Apache for Maximum Per...
Tres Hofmeister
freeSSHd - free SSH server
Proxytunnel Project Homepage
aerolitheos
OS/2 still lives.
Munin - Trac
Download details: Windows XP SP2 Support Tools for Advanced Users
Open Source Energy Network ( OSEN ) - Home
Unipage.org - Home of the Unipage format and the Unipage Unifier
UltraVNC
Tab viewer (Yes Im a table junkie) and NTLM authentication
Official VNCon Website - [Main Page]
VNC Central
07_Cloning complex System landscapes Bernd Herth.pdf (application/pdf Object)
Know Your Stuff :: Home Inventory - powered by EZasset
Insurance Information Institute (III)
wikiCalc Alpha Test Home
Spamato Spam Filter System
::: BashBurn - It just works! :::
O"Reilly Network -- Building a High-Availability MySQL Cluster
ONLamp.com -- Network Filtering by Operating System
ONLamp.com -- Introducing Lua
Macsimum News - The "do"s" and "don"ts" of hot spot usage
tanais: How to save £100 (and try not to break something in the process...)
Debian GNU/Linux -- The Universal Operating System
Sharp Ideas: Downloads
Linux4n6.be
Solaris Networking - The Magic Revealed (Part I)
Robots.txt File Tutorial
NewsForge | FOSS for OS/2: Keeping the flame alive
Tech Blabber » The History Of 404 Page Not Found
IBM Redbooks | Security Considerations in Notes and Domino 7
Adult ADD Strengths » Top 10 Advantages of ADD in a High Tech Career
Samba Server Configuration in Debian
DebianHelp.co.uk-Debian help made easy
Brutal Chess Development Blog
Alex"s Firewall ByPasser
Edgewall Software: Trac
Vlad: Software: OSSMON
SourceForge.net: OpenSharePoint Team Service
GPixPod
Simba
Checkmate MP3 checker - Check MP3 files for errors
Active Directory Authentication Notes - Waikato Linux Users Group
Ethereal Capture Filters
SimpleAssets
Feta Efficiently Tracks Assets
SAP Note 47057: R/3 and DHCP
SAP Note 195715: Service connection types "BW RFC" and "BW GUI"
SAP Note 99435
TTS Interactive Demo
HP StorageWorks SSL1016 Tape Autoloader - HP StorageWorks Tape Drives - The Rep...
"To maintain a viable cost structure, HP could not continue to stock multiple colors of what is essentially the same product in our repair centers worldwide."
The Ranger Creed
Chess Quotes
My credit report is in error. How can I fix it? | IndyStar.com
D*I*Y Planner 3.0 (Classic/A5 Edition) | D*I*Y Planner
Shogi Variants: HomePage
Mini Network with a Big XServe Style | MetaSkills.net
All about Linux: A collection of books, howtos and documentation on GNU/Linux fo...
Windows XP installation guide | Michael and Mary"s site
Everything Linux (No Frames Version)
Everything Solaris
APSR - Project
Umbrello UML Modeller
Why Not Python?, Part 4 | Linux Journal
Why Not Python?, Part 3 | Linux Journal
Why Not Python?, Part 2 | Linux Journal
Why Not Python?, Part 1 | Linux Journal
Parallel BZIP2 (PBZIP2)
IMDbPY
HTB-tools: News
ONLamp.com -- Building Decision Trees in Python
O"Reilly -- Free Your Music: How to Convert Digital Audio Files
Bumblebee Instrument Management System : Bumblebee
netrw
¯`·.¸¸.-StIgMa.DyNdNs.OrG·.¸¸.·´¯: My Nagios Contributions
IBM Redbooks | Solaris to Linux Migration: A Guide for System Administrators
ND7 Reviewers Guide
IBM - Supported Configurations of Notes and Domino 7.0
IBM - Upgrade Central: Planning your upgrade to Lotus Notes/Domino 7.0
VERITAS Backup Exec (tm) 10.0 for Windows Servers BEGather - Log File Gathering ...
Common threads: OpenSSH key management, Part 3
Common threads: OpenSSH key management, Part 2
Common threads: OpenSSH key management, Part 1
Trendmicro Scan Engine Updates
Trend Micro Virus Information, virus alerts, advisories, Top 10, antivirus, worm...
Current TrendMicro Verisons
Sprint/Verizon EVDO compared :: EVDOforums.com
How to Perform System Boot and Shutdown Procedures for Solaris 10
Stormy Dusk on Flickr - Photo Sharing!
Digital Camera Resource Page: Welcome
Nikonians: Nikon User Community Digital Film User Nikon Camera Info Nikkor Lense...
ACLs & Delay Pools Under Squid
NagiosExchange: Featured: NagiosOnCD: Summary
kenkinder.com - Using Verizon Wireless EVDO, PC5740, and Linux
LinkChecker - check websites and HTML documents for broken links
midge - adm5120 linux mini distribution: Main
Home | NetMRG
Openoffice.org Label Templates for Ooo Writer free
Natural Handyman"s Caulks and Caulking Page
CPS Project
Monitoring access to Server SQUID | HowtoForge - Linux Howtos and Tutorials
Cheat Knoppix 4 to Improve Performance Part 2. Knoppix Performance Improvement C...
Memory Ten - Computer Memory upgrade RAM memory upgrade PC DDR SDRAM memory Upgr...
mwcollect - Trac
Memo from the Derby Files
Common Malware Enumeration (CME)
Check if Firefox is updated
OpenQRM - Open Resource Manager - Home
TiddlyWiki - a reusable non-linear personal web notebook
Welcome to HR Clean
Windows Alt Key Codes
In Windows Server 2003 and in Windows XP, W32Time frequently logs Event ID 50, a...
The CMS Matrix - cmsmatrix.org - The Content Management Comparison Tool
Neal"s Admin.Notes.: Windows 2003
Time synchronization may not succeed when you try to synchronize with a non-Wind...
tutty.dwalin.ru :: tutty
additional feature patch to putty
Network Administration Tools: GNU/Linux, Windows 2003, Windows 2000, NT, and mor...
Sendmail Configurations
MailScanner
TechCrunch » The Online Storage Gang
Mighty McPilgrim: Broke Mac Mountain
Mark"s Cyber Domicile
Domino Dude | BlackBerry Tips
Coolz0r - Marketing Thoughts » Super RSS Tools
SDN Podcasts
Russell Beattie Notebook » Motorola RAZR V3 Power User’s Guide
Multiple Intelligences
spiralbound.net
Interesting stuff
spiralbound.net » Solaris Useradd Syntax
Add users in Solaris
MRTG - Tobi Oetiker"s MRTG - The Multi Router Traffic Grapher
Learning Solaris 10 » Zones : Unofficial FAQ
Python Humor
Replacing a failed boot disk
metastat
Streber pm - a web based free open source project management tool with php 5 mys...
Nagiosgraph with Windows support at Nerhood Weblog
GNUpod - GNU Project - Free Software Foundation (FSF)
SNMP4Nagios::Home
Crash Course: The ABCs of WPA2 Security | Learn How Wi-Fi Protected Access 2 Wor...
Free Software Magazine - Free Software Magazine
Free Software Magazine - GRUB tips and tricks
The Story Behind Apple"s 1984 Ad
FreeOSZoo download page
:: Authentic Happiness :: Using the new Positive Psychology
Linux Project Notes
Icon Library, a database of Cisco corporate icons for use in Cisco network topol...
How-To: Build a practical HTPC - Engadget
DOS and Windows 3 Utilities
Google Code: Web Authoring Statistics
StopBadware.org
Explore the Linux memory model
The amazing web site of Shakespeare"s Sonnets
CATS - Home
Application Tracking System
http://www.ihackedthisbox.com/pub/papers/sysadmin.txt
PHP Classes - Class: Forms generation and validation
SMTarPit
Sing Along with Mary Beth
MacDevCenter.com: Putting Google Video onto Your iPod
Undervolting a laptop
GNU/DOS
Nakfull Propaganda - Entering the EFI Menu
FreeNAS: The Free NAS Server
The processor wars Part I, “The death of Alpha”: Q&A with Nebojsa Novakovic
PersonalAlpha
SourceForge.net: iPod video encoder
A Leadership Primer from Colin Powell
Events And Errors Message Center: Advanced Search
Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh S...
Configuring the Windows Time Service
Trend Micro™ CWShredder™
Inner Algebra - How To Do Algebra In Your Head
Creating a favicon.ico for Internet Explorer 5 and Netscape Navigator 7
png2ico - PNG to icon converter (Linux,GNU,Windows,Unix)
retune
HP iLO Monitoring
New Lost Labyrinth Homepage
Bob the Butcher - It"s just a crash
Distributed Password Cracking
Debian Reference
Kallisys | Newton | Einstein Project
Podget.
YamiPod - Home
nethack.net - netmapr
Solving Sudoku
» Homegrown Audio Books and iPod
Welcome to the GPAC Project on Advanced Content
m4a)
Anti-Spyware Coalition
Emulation to provide windows only printers to a wider range of clients
Linux.com | An introduction to services, runlevels, and rc.d scripts
Create3 - A Newbie Guide to Setting Up Sendmail, Fetchmail and Procmail
The Last iPod Video Guide You’ll Ever Need at Plastic Bugs
SMS Server Tools
SecureApt - Debian Wiki
ScanJet Music
VoIP Service Provider"s Ten Commandments - The VoIP Weblog
developerWorks : Linux : Technical library view
General Protection Fault--The Comic Strip
InterScan VirusWall Userguides
Iscan install for Solaris
VPN Discovery and Fingerprinting Technique
How To: Asterisk Answering Machine : TomsNetworking :
RoadKills CaFe, A GNU/Linux state of mind.: libdvdcss and why we need it?
Free Remote KDE Desktops from CosmoPOD.com
KDE desktop anywhere but does it work through a fw?
Debian Administration :: Installing Debian onto USB flash media with everything ...
Linux Mail Server
x2vnc 1.6.1
MSFN"s Unattended Windows : Introduction
Computer Programming Algorithms Directory
Extratasty Get Your Booze On!
The History of Notes and Domino
Partition images with Partimage and Partimaged « Raoul’s Land Reloaded!
:: The Flux :: World"s First iPod Video Film Festival :: Now Accepting Entries :...
developerWorks : Linux
Common threads: Sed by example, Part 3
Common threads: Sed by example, Part 2
Common threads: Sed by example, Part 1
LoFiMo - Log File Monitor
Project Raptor
Juniper Networks :: Technical Documentation :: ScreenOS Software Documentation
Configuring a NetScreen Firewall: Best practice guideline for the basic setup of...
My French Picture Dictionary (English - French)
index ||| WikiSH, the Wiki engine written in /bin/sh - do.homeunix.org network
What cant be written in shell?
Lustre: scalable, secure, robust, highly-available cluster file system
Speedometer - Bandwidth Monitor
SourceForge.net: Bluediving
Oramon: Home
Need Registration for download. :(
SQL Server Information at SQLTeam.com
ms-sql mssql
PortableApps.com | Your Digital Life, Anywhere™
SANS - Internet Storm Center - WMF discussion and thoughts
The true legacy virus: An image virus is back on the scene (until 1/10/05)
Rules-of-thumb for monitoring Windows NT/2000 and Domino statistics
IBM Redbooks | The System Administrator"s Companion to AS/400 Availability and R...
IBM Redbooks | A Holistic Approach to a Reliable Infrastructure for SAP R/3 on A...
Stephen S. Constantine: Lotus Notes/Domino R5/ND6 Administrator - Home Page
How to create a Juniper/Netscreen VPN in 5 quick s
Quick and Dirty Screen to Screen policy based VPN
FreeS/WAN Project: Home Page
RANCID
Your source for Family Guy episodes
Guide to Lock Picking
ScreenOS Hidden Commands Revealed
Juniper Networks :: Software Documentation for ScreenOS 5.0
iWay : Use your iPod Photo or Nano as a Yahoo! Maps directions viewer!
macteens Magazine - Putting DVDs onto your iPod
Google Maps on iPod Photo
Spaceweather.com Presents: Aurora Galleries
Installing Lotus Notes 6.5 under Wine
Welcome to Badcaps.net!
Small, Fast, Clean, and FREE PDF Reader for Everyday Use
Not opensource but might be interesting
Student Finds a Stolen Thesis by Thinking Like a Thief
Notesbench
The Encyclopedia of Arda
iftop: display bandwidth usage on an interface
Bruce Perens" Open Source Series Series
Main Page - wikiPodLinux
10-2003 SuperCap Battery.pdf (application/pdf Object)
openmss.org | Main / Home Page
Hasbro
Jay R. Wren - lazy dawg evarlast » SSH Connection Sharing, C++ Visibility, Share...
KMaps FAQ - Kmaps
CyberDewey
Links organized via Dewey Decimal System
ONLamp.com: Organizing Files
Organizing Computer Resources
backing up thunderbird / hddsaver.com
Lotus Notes Out of Office Agent, revisited: Part 2
Lotus Notes Out of Office Agent, revisited: Part 1
Java(tm) Optimization and Java Performance Tuning Techniques
KDE Wiki - Performance Tips
Poetry Archive
Frugal For Life: Weekly Inspirational Quotes
Main Page - Wikilaw
FAQ - ClusterSSH
Cite CRM
OCS Inventory NG
grack.com: Welcome to grack.com
The Search for A Good Story: Top 10 System Administrator Truths
FloodSmart.gov: Your premier resource for flood insurance information
10 things you should do to a new Linux PC before exposing it to the Internet
Titration: Project Tracking Software
Neogia - Open Source ERP and CRM Solution
castget
contineo - Open Source Document Management
Fasterfox - Performance and network tweaks for Firefox.
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows XP/...
Finally for Linux!
Ophcrack 2.0 -- The fastest Windows password cracker
Java Tuning White Paper
Sysinternals Freeware - RootkitRevealer
Spice Trade
C-evo, Empire Building Game
Welcome to The Clash of Civilizations Web Site!
KeePass - The Open-Source Password Safe
SSL-Explorer: The World"s First Browser-Based, Open Source SSL VPN
CitrusDB - The Open Source Customer Database CRM Software
DCC Alliance
OBM obm.aliacom.fr
DRIP Central
Linux.com | CLI Magic: More on SSH
io - about
acheron development - BIRT
Avfs: An On-Access Anti-Virus File System
10,024 CleanItGuide 2003.pdf (application/pdf Object)
McCormick - Spice Encyclopedia - Cloves
EULAscan: community-written EULA reviews
Professional Association of Innkeepers Int"l
All about Linux: Adding Windows Fonts in Linux
Setup32.com
Brendan Gregg"s Homepage
Data Encryption — A Must for Today"s Corporations - ITAudit - The Institute of I...
Telnet - SMTP Commands (sending mail using telnet)
How to use Gmail as your SMTP server
Small Business Resources, Business Advice and Forms from AllBusiness.com
A quick AWstats guide « Raoul’s Land Reloaded!
Linux.com | Qmail Toaster makes mail server setup easy
DNRD - Domain Name Relay Daemon
lpr-bash
sendmail Tutorial
Help Desk Portal
Mail Filtering - Introduction
LearnOutLoud.com Free Audio & Video Html- Free Audio Books, Lectures, & Speeches...
Dirk Loss: Windows-Tools on CD-ROM
Portable USB Drive Apps - TheUselessWiki
Eye Movement and Lying - How to detect lies
Debian Backports
OpenTTD - News
Programming E-Books
Adrian"s Rojak Pot
Blocking_Skype.pdf (application/pdf Object)
Federico Mena Quintero - November 2005 Activity Log
O3: The Open Source Enterprise Data Networking Magazine
freesound :: slashdotted for now
Unix Portal:Nexenta OS - Nexenta GNU/Solaris
Dia icons
Cisco PIX Firewall - Practical Guide
cisco vpnclient password decoder
SourceForge.net: CISCO IOS Simulator
Cisco PIX Firewall Basics
Patch Check Advanced
OptiPNG Home Page
IVR Cheat Sheet to Find a Human
SARG
Notes Downloads
NPR : This I Believe
High Performance Enabled SSH/SCP [PSC]
ONLamp.com: TCP Tuning and Network Troubleshooting
Kflickr mt - ThiesenWiki
MySQL Squid Access Report
Frappr!
Google maps enable webbased thingamagiggy
UEG - Robotech Movie - Home
The Robotech Companion
Robotech Lab :: Help us to build free robotech games !
Flex Profile Kit 4.0 is now available! (And it"s still free!)
login scripting on steriods
O"Reilly: What Is Screencasting
The 11-Year Quest to Create Disappearing Colored Bubbles - Popular Science
I Forgot My Administrator Password!
TipMonkies » Blog Archive » The Penultimate Guide to Google Services
ProduKey - Recover lost product key (CD-Key) of Windows/MS-Office
Projects - fakeAP
All about Linux: The Complete Concise History of GNU/Linux
The Orion Sector :: Master of Orion 3
Master of Orion 3 Patcher
The Master of Orion 3 Guardian
Unattended, A Windows deployment system: Welcome
Chris McCafferty: AutoIT: How to Install Windows Software with AutoIT
Good collection of AutoIT install scripts.
Java Silent Installation
Oreon - Network & System Monitoring
Java Tester - Home Page
ModSecurity (mod_security) - Open Source Web Application Firewall
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
nsftools.com - Tools, Tips, and a Weblog about Lotus Notes, Domino, and Java
MIT OpenCourseWare | OCW Home
The Trac Project - Trac
Paymaster - News
Open Source LMS OLAT | About OLAT
linux/arpwatch NG ::
Chrootbin Homepage
What is smtpguard
RainbowCrack Online
"The Washington Monthly College Guide " by The Editors
United States Postal Service - Abbreviations
Knowledge at Wharton
Tax Policy Center
American Petroleum Institute - new section 15F265AB-6808-494F-A418BA6D4B68BD59
TATE ETC. issue 5: The Drink that Fuelled a Nation"s Art
Absinthe: what"s your poison? -- Strang et al. 319 (7225): 1590 -- BMJ
NewsForge | NewsForge presents free OpenOffice.org training videos
The Binary Opinion: How to Secure Windows XP...For Real!
linksys wrt revival
How-to: VMware player modification - hack a day - www.hackaday.com _
Cisco - Cisco VPN 3000 Concentrator FAQ
Debian Linux on the Dell Latitude D600
SANS - Internet Storm Center - Cooperative Cyber Threat Monitor And Alert System
Hardmac.com : 12in iBook upgrade
People & Projects Tracking System Splash Page
KlamAV
Shift Work Scheduler
Network Manager
ITIL - ITIL
ITIL | Achieving IT Service Leadership
OGC - IT Infrastructure Library (ITIL)
SBA - Business Plan Basics
The ITIL ® Toolkit
The ITIL Community Forum
Tidybot Home Page
Dell Inspiron 8x00 fan control
Updated Dell D600 tips for Linux
Konfabulator - Gallery of Futurama Charactors
Chapter 1 Oracle and SAP
Vision For Hire: How to "un-brick" a WRT-54G wireless router (and why) -- and ot...
scfdot: SMF Dependency Graph Generator at OpenSolaris.org
Allowing controlled SMTP relaying in Sendmail 8.9 and later
DABCC.com – Citrix, Microsoft Terminal Services, Softricity, and RES Training Si...
Citrix MetaFrame for Windows Servers- Installation and Tuning Tips
VPN Client GUI Error Lookup Tool [Cisco VPN Client] - Cisco Systems
Joern Brabandt"s Blog on SAP and Netweaver - Your own Logo in the SAP screens
Mac VoIP -- VoIP record calls
Greg Goebel / In The Public Domain
The Ungoliant Project Home Page
Hotrod Your Linksys WAP with Linux
Keene Enterprises :: Open Source :: BackupPCd
SchemaSpy
Index of /~ben/funkload
Guido van Robot
Logicalware - Open Source Community for MailManager
Index of /bacula-snmp
Cacti: The Complete RRDTool-based Graphing Solution
Make Firefox Look Like Internet Explorer :: Mozilla Stuff :: JohnHaller.com
Tie-a-Tie.net | Learn How to Tie a Tie
SparkNotes: Today"s Most Popular Study Guides
Apple Rip-offs
Mark Twain
HNS - The Story of Snort: Past, Present and Future
The MINIX 3 Operating System
Home - Berkman Center for Internet & Society
The First Email
Deleting mail from the mail queue
Ryan"s Network Tips
An Introduction to Artificial Intelligence
Linux.com | What do to when apt-get fails
Linux System Startup | Linux Journal
Header Backgrounds - Another Step-by-step Tutorial by Veerle
How to Write a Resume
The CUPS Printing System | Linux Journal
Heating with Oil - Maintenance
HOWTO Use hdparm to improve IDE device performance
.:[ packet storm ]:. - http://packetstormsecurity.org/
Internet Health Report
Business Software Alliance, Promoting A Safe & Legal Digital World
Young Entrepreneur Journey: Random Ruminations on China
Web Sudoku - Billions of Free Sudoku Puzzles to Play Online
Everybody"s Guide to OpenDocument | Linux Journal
FMPro.org - The Ultimate Site For FileMaker Pro
Cricket Home
accounting_forensics.pdf (application/pdf Object)
Linux.com | Advanced Squid
Linux Magazine
zufall
nagcon
IBM Redbooks | Lotus Domino Domain Monitoring
A Comparison of Solaris, Linux, and FreeBSD Kernels at OpenSolaris.org
The Tao of Mac - Python/Grimoire
Procedures (cookbook-style how-to"s)
Linux: My Contributions to free software
http://www.garloff.de/kurt/linux/rescan-scsi-bus.sh
Linux: My Contributions to free software: rescan-scsi-bus.sh
Test SMTP Service in IIS and Exchange
BIND 8 for NT - Is my DNS a Mess? Probably!!
Grauw’s web spot - BitTorrent clients review
HOW-TO - Ethernet Cables
Cisco Device Management
Switchmap
The Cisco-centric Open Source Exchange Community
Linux Training and Certification Classes
Tiny ERP & CRM:
WebCleaner - a filtering HTTP proxy
flactagger
Antispyd Project - An Open-Source web threat filtering solution
PosteRazor - Make your own poster!
Open Source ERP & CRM
KDE Developer"s Corner - Konstruct
ID PAL Label Printer by Brady
Help Desk Software
Cisco IOS Basic Commands
Inverse Multiplexing for ATM Solutions.pdf (application/pdf Object)
Spartan Xilink
Crypto Law Survey
Routers/Switches: Auto config-save to TFTP server on Cisco routers and switches.
IT Baseline Protection
Linux@DUKE: Epylog Log Analyzer
Driftnet
tcpxtract
Foremost
Duffbert"s Random Musings - Troubleshooting Notes Client Crashes
Dane Carlson"s Business Opportunities Weblog - Opportunities, news, and links fo...
SMF-migrate.pdf (application/pdf Object)
NcFTPd: Transfer Log Format
OpenVMPS
Duffbert"s Random Musings - Table of corresponding Notes/Domino 6.0.x and 6.5.x ...
NSLU2-Linux - Main / HomePage
Anton"s Security RSS Feed Watch
The Sleuth Kit
Pass on Passwords with scp | Linux Journal
httping
Assetman Index
IIE - Image Information Extractor
faces
Symantec Security Response - Intelligent Updater Notification Page
Latest updates
History According to Bob | Podcast History | Podcasting Stories of History
Princeton Public Library - African American Genealogy on the Web
Requirements-Led Project Management: What Is the Value of Requirements?
Removing Norton AntiVirus 2003 or earlier by using the Rnav2003.exe removal util...
Mercedes-Benz International - International Home - Entertainment - Mixed Tape
Object Role Modeling
Linux gains lossless filesystem
Linux.com | CLI Magic: Logrotate
NetScreenForum.com :: Index
Bart"s Preinstalled Environment (BartPE) bootable live windows CD/DVD
"How does SSL Work?" from the Ask Dave Taylor! Tech Support Blog
TaskFreak! web based task manager / todo list written in PHP
Tellico - a collection manager for KDE 3.x
sukria.net - Backup Manager - A small Linux tool for making backups.
Government Podcasts | Free Government Information
Librarian"s Resource Center
WirelessAnarchy has arrived - hide the kids.
greg hughes - dot - net - Use Cisco VPN Client on TCP 443 or 80 to solve connect...
kccmp - kernel config compare v0.1 | stoopidsimple.com
welcome to habitat - system garden
pmacct-fe :: a tool for presenting network statistics.
Out S.M.A.R.T (SMART) Your Hard Drive
Wardriving Tools, Wardriving Software, Wardriving Utilities (Wireless LAN Securi...
Good real estate google map hack
WinDirStat Home Page
Ditto, Clipboard Extension
VLC media player - Overview
GraphCalc The Ultimate Windows 2D/3D Graphing Calculator Software
F u t u r e M e . o r g
Linux.com | CLI Magic: p0f
del.icio.us Social Bookmarking - Creating a reusable copy of a "tagged" RSS file
Home CollectiveGood, cell mobile phone recycling
geektechnique.org: How-to hand crank power your ipod...
untitled
Redet
PHPSPELLBOOK
Lillesvin Networks - phpCF
Welcome to the DocMGR Homepage
Schmih Schmah Schmuh - Programs - Odot
Oolite-Linux
I sure do miss elite and i386s
cron-apt
MySQL Activity Report
UFRAW
LMS - LAN Management System
SnortAlog Page
Main Page - SussenWiki
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
ReactOS Homepage - Frontpage
LinuxDevCenter.com: Installing Debian
ReplicatedOracleSAN 082605.pdf (application/pdf Object)
Dataguard.pdf (application/pdf Object)
.:Asterisk VoIP News:. Daily Updated News and Help about Asterisk, VoIP and PBX ...
Notebook Screen Guide
Stompbox Networks
Fastermini.com - Source for Mod, Upgrade and Overclock your Mac Mini
Todd Dailey - Weblog - Blog Archive - Restore your iPod nano to new condition wi...
sunkencity.org
Neckties.com: Men"s Silk Neckties and Bowties
The "Lectric Law Library"s Entrance, Welcome & Tour
BigAdmin Feature Article: Secure Shell: Part 2
BigAdmin Feature Article: Secure Shell: Part 1
Rebuilding Squid on Debian with the logformat patch — Upfront Systems
Re: httpd to squid native log format convertor? from Peter Reif on 2000-01-07 (s...
MozBackup - A utility for creating backups of Mozilla Firefox, Mozilla Thunderbi...
Drivers for SAP printing
Notes reconfigure via INI editing
jbeale-bastillehardening.pdf (application/pdf Object)
Built Green Colorado - Green Builder Program of Metro Denver and all of Col...
A $10 Linux Answering Machine
Beautiful Soup: We called him Tortoise because he taught us.
Cowtacular
[GLPI - Gestionnaire libre de parc informatique]
Stellarium Astronomy Software
Firewall Builder
GNU MDK - GNU Project - Free Software Foundation (FSF)
Using the AirPrime 5220 1xEV-DO card on Linux
lukeSoft .Traf Proxy Server Log Analyzer
isoqlog
newtVNC: VNC for the Newton
A Natural History of the @ Sign: Part One
RFIDAnalysis.org
simplyhired.com | the largest job database on the planet
Expect - Expect - Home Page
Using ftp in a shell script
.netrc
openISP.net September 2005
WSRCC Spam Fighting Page
Welcome to the OpenNMS Project - OpenNMS
LinuxFund.org
SAP Developer Network Wiki
Tunneling SSH over an HTTP-Proxy Server
ASTPP Wiki - Main - HomePage
Tommy"s (SveaRike) homepage
FrontPage - Mercurial
LGames - Linux Games
AutoScan - Network Monitoring and Management Tool
OpenGrade
Prof. Steve Mann
::uberGeek::Toons::Switch to Linux()
Storm Chaser Photography Page
System Rescue with Knoppix
Kalysto - /Utilities/dd_rhelp - (rescue hard disk helper)
webMethods Advantage - supporting the webMethods Community
wMUsers: For webMethods Professionals -- An independent user community
FatWallet Forums - Hot Deals
AnandTech -- Hot Deals
AnandTech: your source for hardware analysis and news
TheIndividual"s Sveasoft WRT54G Firmwares
UBCD for Windows
Docvert [current: 1.0.1]
iReport - OpenSource Java Reporting Tool
xinco DMS™ - Open Source Document Management Systems
Eidetic Document Management System
Jan Setje-Eilers"s Weblog : Weblog
the jackol’s den » htaccess Cheatsheet - Mikhail Esteves
Serial ATA (SATA) on Linux
Successful SolarisTM Performance Tuning
Solaris™ 8 Performance Tuning
airfinder: MAC finder
SourceForge.net: Project Info - PyKanjiCard
dd_rescue
Ddrescue - GNU Project - Free Software Foundation (FSF)
Cmos, LILO, NT passwords - Data recovery
Jpegdump Version 1.18 in Kurts Homepage
Mailinator:Spam Map
Library Success: A Best Practices Wiki - Library Success: A Best Practices Wiki
preprint.pdf (application/pdf Object)
Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh S...
The irongeek is really rocking these things out
Home - Confluence
Rover of Windsor - 流浪者: Our Favorite Cheat Sheets
Theos Soft
Linux.com | CLI Magic: the word on wget
Bless
Symmetrix Technologies - Downloads
Crossroads
Mechanoid
SMFS :: Smart sendMail FilterS for SPAM and VIRUS filtration, free virus scan, s...
LAT - LDAP Administration Tool
nepim - network pipemeter
nagiosdigger
SourceForge.net: Project Info - KeePass Password Safe
KC Softwares
FreeDOS | The FreeDOS Project
SuSE mailinglist: Re: [suse-sles-e] Boot Hang with New Installation on Compaq ML...
Notes/Domino 6 & 7 Forum : Date\All (Threaded)
Notes/Domino 6 & 7 Forum : RE: install LN5, LN6, LN7 together
Pink :: Braeburn :: Tracing the history of Computing
After a Disaster: Repairing Your Home
Tom"s Hardware Guide PCs & HowTo: Windows In Your Pocket - Introduction
Beagle - The next generation of Linux desktop searching
Enterprise-Wide Network Management with OpenNMS
Enterprise Expense Reporting Software
robinbowes.com - Converting FLAC files to MP3
HellChess of HellHound
Open Clip Art Library :: openclipart.org :: Drawing Together.
"How do I change the hostname in Solaris 9?" from the Ask Dave Taylor! Tech Supp...
Notepaper Generator
.htaccess tricks and tips.. part one: tasty food for web serving thoughts.
Squid configuration for rsync
encrypting syslogd with stunnel4
Intel Centrino Guide
SmartCard Infrastructure : References & Links
The 29 Healthiest Foods on the Planet
Tiquit Is Quality User Incident Tracking
Linux.com | CLI Magic: locate, slocate, and rlocate
Data Tables and Cascading Style Sheets Gallery
Teach Yourself Programming in Ten Years
Popcasts (BETA) - most popular podcasts at a glance
Localhost
About SoapCrafters.com
Home Wiring Repairs in the Real World
Primer on Gasoline Prices
AAA Daily Fuel Guage Report
Starwarz Rap
TUX | The First and Only Magazine for the New Linux User
Cisco Systems Technical Users Magazine-Packet Magazine - Cisco Systems
Finding Rogue SMB File Shares On Your Network
AppleCrate: An Apple II-Based Parallel Computer
How to write keyword-rich electronic resumes
USENIX - Publications - Compendium of Best Papers
Linux Syslog Server - How To Set Up A Debian Linux Syslog Server
opensourcemac [nothickmanuals.info]
Optimizing Oracle 10g on Linux: Non-RAC ASM vs. LVM | Linux Journal
Partition Logic
Install Oracle10g (10.2.0.1) on CentOS 4.1 (RHEL 4 Update 1) | Linux Gazette
About Ajaqs
SourceForge.net: Project Info - storebackup
freshmeat.net: Project details for zaurus_datebook_to_vcs
SRtool homepage
DIY Xerox Printer Shredder - Overview
Category 5 / 5E & Cat 6 Cabling Tutorial and FAQ"s - the best source for informa...
Script for DB2 Universal Database using REXX: Learn REXX fast
Controlling spam: Advanced SMTP settings in Lotus Domino
Controlling spam: Advanced SMTP settings in Lotus Domino
IBM Lotus software: Lotus Documentation: Lotus Domino 7 (English)
SourceForge.net: Project Info - Nagios-DB
Bill Kearney: Autoconfig proxy settings
Automatically Configure Browsers for Proxy
Proxy Client Autoconfig File Format
John Cowan"s Home Page
Smart Open Source ERP Software Solutions with integrated CRM Software Solutions ...
Barracuda Networks :: View topic - Lotus domino with barracuda
Dell Latitude D600 : Page 1
What to do when your LDAP port"s already in use
LDAP-HOWTO
Customizing your LDAP Directory"s Schema
Designing an LDAP Directory Tree
An Introduction to LDAP
Magazine Cover
SAP Top Sites Ranked By Vote - SAP Training, SAP Consulting, SAP Jobs, SAP Resou...
Lotus User Group
Dr Dave » Spam Karma 2.0
Barracuda Networks :: View topic - OID numbers for Monitor the BSF
Barracuda Networks :: View topic - monitoring & alerts
SourceForge.net: Project Info - PiArmada
Creating a Star Rater using CSS » Blog » Komodo Media
Jon Aquino"s Mental Garden: Audiolicious: Turn Any RSS Feed Into A Podcast, Usin...
Home Tips: The Web"s Most Helpful Home Improvement & Repair Site
Debian Administration :: cfengine [3/3] : Using cfengine in a client/server setu...
Debian Administration :: cfengine [2/3] : An introduction to cfengine rules
Debian Administration :: cfengine [1/3] : A simple overview of cfengine
Version Control with Subversion
gURLChecker project
TaoSecurity
SAGE - System Administrator Job Descriptions
home [Nepenthes - finest collection -]
An Illustrated Guide to IPSec
LinuxDevCenter.com: What Is the X Window System
Boot loader showdown: Getting to know LILO and GRUB
AFP548 - A True Tale of an Xserve install
Get Recipes on your Apple iPod
THC-HYDRA - fast and flexible network login hacker
LWN: Dissertation: Three ethical moments in Debian
Free Software Magazine - How to recover from a broken RAID5
Ultrize timesheet
SAPRFC Homepage
Application Layer Packet Classifier for Linux
Alexandria: a book collection manager for GNOME
CTShaper - Carlos" Traffic Shaper
Guten: A Project Gutenberg reader
Layer Four Traceroute (LFT) and WhoB - oppleman.com
Schroedinger"s Cat
A to Z Home"s Cool (Homeschool) - Homeschooling Information, Free Homeschooling ...
FirstGov.gov: Reference Center -- RSS Library
Traditional Japanese Music--printer friendly version | National Clearinghouse fo...
The Vertical Farm Project @ VerticalFarm.com
myPHR.com - My Personal Health Record
National Clearinghouse for U.S.-Japan Studies
RFC 3164 (rfc3164) - The BSD Syslog Protocol
02 Experiment: Blogs that share subscribers
Network Notepad Homepage
A Plumber"s Confessions : Designing your Active Directory deployment in under a ...
The Gadgeteer - USB 2.0 to IDE Cable Version 2
How to Make a Category 5 /5e Patch Cable
Network_Hardening_Warfare_Strategy.pdf (application/pdf Object)
ThePharmingGuide.pdf (application/pdf Object)
Dan Bricklin: The personal web site of the co-creator of VisiCalc
LFTP - sophisticated file transfer program
Integrigy_OracleDB_Listener_Security.pdf (application/pdf Object)
Oracle FAQ: Oracle Security
myFICO - FICO® Score Estimator
SourceForge.net: Project Info - scooter
SugarCRM - CRM Software - SugarCRM - Open Source Customer Relationship Managemen...
How to configure your router to allow fast BitTorrent downloads - The Peer-to-Pe...
Irongeek"s GUI HP Printer Display Hack
Install On A Partition Simple And Accurate - OSx86
» Best Hacking Tools and Tutorials
Ten Easy Ways to Improve Your Resume
TipMonkies » Blog Archive » Writing Linux firewall rules w/ IPTables
Oracle® Database Quick Installation Guide
Zebra Tables: A List Apart
CSS tests
GData: An Online MD5 Hash Database
Linux.com | Limiting Linux logins
The Code Project - Start Your Windows Programs From An NT Service - System
NewsForge | Best practices for the Linux home office, part 3
NewsForge | Best practices for the Linux home office, part 2
NewsForge | Linux wireless freedom with OpenWrt
Linux.com | CLI Magic: Make time for crontab
NewsForge | Best practices for the Linux home office, part 1
Deep Network Analyser (DNA)
IPplan [IP address management and tracking]
Asterisk@Home
DokFLeed.Net --Security Portal - Oracle TNSLSNR Full Client
ReligionFacts.com - Just the facts on world religions.
O"Reilly: Building My MythTV Box, Part 1: Hardware
O"Reilly: Building My MythTV Box, Part 2: Software
Oracle Database Online Documentation 10g Release 2 (10.2)
Step-by-Step installation manual of DBD-Oracle-1.16 on Sparc Solaris 9 with Orac...
Inlab: Balance
Intuitive Systems: Thoughtful Solutions by Dave Taylor for Teaching, Speaking, W...
Welcome to Project Gutenberg - Project Gutenberg
Sendmail Logging Documentation
:: Spam Filter | Spam Firewall | Barracuda Spam Firewall | +1-416-444-7530 | Sec...
A Comparision of the Size of the Yahoo and Google Indices
Stylegala ★ design | css | standards
/* Position Is Everything */ Modern browser bugs explained in detail!
Ruthsarian Layouts
glish.com : CSS layout techniques
CSS Vault » The Web"s CSS Site
Cascading Style Sheets, Level 2
Listamatic: one list, many options - Using CSS and a simple list to create radic...
CSS From the Ground Up - 1
Web Developer"s Handbook: developing web-sites, exploring own imagination | CSS,...
css Zen Garden: The Beauty in CSS Design
Oranna, GTK based Oracle Client
Configuring and using syslogd
Stichting NLnet; The LogReport Project and the Lire Package
Good diagram of how lire works
Nagios plugins
Mounting ISO images in a virtual CD-ROM drive
WWW.EBOOK911.COM - ( ASP .NET UNLEASHED by SAMS is now available !)
RFC 2196 (rfc2196) - Site Security Handbook
Using Firewalls to Block Spyware?
Spyware Weekly Newsletter :· August 12, 2005
Richard Koch"s web site
Collected Quotes from Albert Einstein
Mapping Sex in America - The Museum of Sex
Flavio’s TechnoTalk » Blog Archive » General purpose computation using a GPU and...
Linux News :: VRAM Storage Device - How to use the memory on GFX board in a diff...
cowdancer - copy-on-write data access completely in userland
The Ur-Quan Masters - News
plan/b | backup from anywhere, to anywhere
WindowsDevCenter.com: What Is a Pivot Table
The Education Podcast Network
Common Content
McMaster University Archive for the History of Economic Thought
The Coolest Car in the World
Airlink Wireless Hacking
UNIX Load Average Part 1: How It Works by Dr. Neil Gunther
SPAM and Unix sendmail
ucdavis
ONLamp.com: Five Tips for a Better sendmail Configuration
Upgrading Sendmail
RHCE2B.COM- Free RHCE Linux Test Preparation Site
Beginner"s guide to armoring Solaris
Google cache version
Unix System Administration - Network Monitoring by Opensysmon
Frugal Book list
Digital Black and White
Installing OpenSSH for Windows 2003 Server - How to get it working
Welcome to openSUSE.org - OpenSUSE
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
Barracuda Networks :: View topic - LDAP verification against a domino server
Apt-Pinning for Beginners
qcterm
Barracuda Networks :: View topic - Better LDAP Filter for Exchange Servers
MPE/iX 5.0, 5.0 Express, 5.5, and Communicator 3000
Dave Glover "Down Under (Oz)" : What Sex is your Computer? Fun/Silly:-)
Synergy
Ext2 IFS For Windows
Laptop Mode for Linux 2.6
Website Uploads with lftp | Linux Gazette
chammer
JHylaFAX - JHylaFAX
Scapy
Pete Finnigan - Oracle and Oracle security information
Google Cache Checking Tool
Network Communication
Technical papers template
3k Associates" HP3000 Publications
freevt3k - An NS/VT terminal emulator for Unix
LDAP Browser - Softerra LLC
Barracuda Forums = Batch File Automatically Backs Up Your Barracuda
Backup the cuda via batch
MTA Basic operations
RegLookup Home
Sun[tm] Patch Check: Save Time Managing Your System"s Patch Level
Solaris - Tuning Your TCP/IP Stack
Patch Check Advanced
The NTP FAQ and HOWTO
coolcommands.com - the search engine for unix sysadmins :: unix commands and scr...
SchilliX - OpenSolaris based Distribution
Mirroring Disks with Solstice DiskSuite
Solaris 8 Jumpstart Setup/How-To
Solstice DiskSuite - Admin"s Guide
Device Mapping on Sun Servers: A Quick Guide
NTsyslog
arch-wp.pdf (application/pdf Object)
III_LispBook_Apr66.pdf (application/pdf Object)
LISP 1.5 Programmers Manual.pdf (application/pdf Object)
How to Be a Leader in Your Field
DSLnuts | DSL Wiring 1
Sushi Lesson: How to eat sushi properly, Part 5 | Bayosphere
How does SSL work? Easy to understand SSL Certificate and HTTPS
Flexbeta - Wireless Data Transmission Security
RadTech Products - CableYoYo - Ultra-thin Cable Management
TweakGuides.com - Firefox Tweak Guide
Sendmail FAQ
untitled
log_analysis
Scrubbing, Shreding, Nuking Old Data
TOOLS & MATERIALS | THIS OLD HOUSE
Home Improvement Tools - Hardware & Accessories : DIY Network
DBA Hacker"s Guide to Solaris
Solaris Performance Monitoring - iostat , vmstat , netstat
Webhistorian by Red Cliff Consulting
Web Historian
Hal"s Low-Tech Homepage
Lots of security related pdfs and other information
SolarisWebcast.pdf (application/pdf Object)
Log Rotation in Solaris
BigAdmin - Submitted Tech Tip: System Log Rotation Utilizing logadm (for Solaris...
Snowfence - a simple firewall for Zaurus
"What is Sarbanes Oxley and why does it change everything?" from the Ask Dave Ta...
"Sarbanes-Oxley affects small businesses too?" from the Ask Dave Taylor! Tech Su...
Corporation Finance: Sarbanes-Oxley Act FAQs
ClamWin Free Antivirus. GNU GPL Free Software Open Source Virus Scanner. Free Wi...
Linux.com | CLI Magic: Regular expressions and metacharacters
Linux, Unix, /etc/: Getting More From Your Shell
Funny Signs: This Week"s Feature
Book Quotes
Free Programming and Computer Science Books
KiXtarting Your Scripts
Linux command line tips
SpiderFoot
Domain Fingerprinting
ntp.org: Home of the Network Time Protocol
WSJ.com - Lawyers" Delight: Old Web Material Doesn"t Disappear
A description of Svchost.exe in Windows XP
What can I delete from my brand spanking new mac mini
ONLamp.com: Live Backups of MySQL Using Replication
WebTst Home
DQ ISSUE 3
NewsForge | Sharing files between OpenOffice.org and Microsoft Office
Loading OPML documents - w3future.com
PowerEdgeForums.com - powered by vBulletin
Chris Linfoot - Site FAQ - Issue 1
Sam Spade
MisterHouse
WRAP Box
OpenGroupware.org
Boing Boing: Microsoft "Genuine Advantage" cracked in 24h: window.g_sDisableWGAC...
Eli"s SharePoint Resources
Running the BIND9 DNS Server securely
viksoe.dk - GMail Drive shell extension
ONLamp.com: Six Things First-Time Squid Administrators Should Know
OPML Editor support: Basic Outlining
OPML Editor support:
BTX Form Factor Info - Article 7 Page 1 - btxformfactor.info
[SUMMARY] rotating squid logs using logadm
startup script of squid on solaris
The BigPond Cable Squid Peering page
mnot: Squij
Mac Mini
Paul Thurrott"s SuperSite for Windows: Windows Vista FAQ
Solaris, Cisco, Firewall, Security Resources by MGMG Interactive
Squid download sitelist
Squid-cache Zero Penalty Hit patch
Squid Cache Purger DOWNLOAD
Wonders of "dd" and "netcat": Cloning OS harddrives
BerliOS Developer: Project Info - apt-history
webcheck: website checker
How to interview and hire people - scottberkun.com
tracert and ping howto
pings out of order
OpenWrtDocs/Customizing - OpenWrt
WRT LCD display mod - hack a day - www.hackaday.com _
Linux, Unix, /etc/: Unix Web Hacks
MacDevCenter.com: Automated Backups on Tiger Using rsync
FRET - helping understand file formats
Mastering the VI editor
Linux Newbie Guide by Stan, Peter and Marie Klimas
Unix Shell Tricks
| www.tecknoxology.com | IRC | Resources | IRC Beginner"s Guide
How To Look Like A UNIX Guru
learn UNIX in 10 minutes
BSD Guides :: Doing Stuff With FreeBSD, NetBSD, OpenBSD, & Mac OS X
NewsForge | Three open source password managers
The HarvestMan WebCrawler
Task Coach
Job Hunter
GanttProject.org - Home
Debian Grimoire: CPAN Debian Packages
Vegetables We Eat
Security inVoIP-Telephony Systems
jigdo (Jigsaw Download) - a download manager for CD/DVD images
NewsForge | Hooking OOo to MySQL
Linux, Unix, /etc/: An Introduction to m4
g3dviewer
Overclockers UK Forums - DSL - Linux USB Key Install Mini How-Too
LSHW
RefreshBlocker for Firefox
Fruity : A Nagios Configuration Tool
Network Monitoring Software LAN, WAN, Routers
Netwhistler
OpenSMART - The Open (System|Source) Monitoring and Reporting Tool
Tstat - TCP STatistic and Analysis Tool
The Unheard Beethoven
LAN/WLAN Interface for Digital Cameras
NSLU2 Linux - HowTo / OverClockTheSlug
Hacked $99 NAS gadget runs full Debian Linux
A History of IBM OS/2: 1991 to 1996 - A WinCustomize Article by Draginol
Frox transparent ftp-proxy home page
Cisco SNMP Object Navigator
Amiga Forever Home Page - Amiga Emulation, Connectivity, History and Support
Roomba Internals
Tomato Nation
Roomba
Roomba Community - Discussing and Dissecting the Roomba
Ad Zapping With Squid
Secure Deletion of Data from Magnetic and Solid-State Memory
Darik"s Boot and Nuke
DoD erase HD
VNC FastPush
Earthmagic.org - Software
About the MD5summer
StackWorks: IRM - The Information Resource Manager
Time Shall Tell - Work Time Tracker
Wing Commander - Privateer Remake
PEAR :: Package :: Services_Weather
How It Works...The Computer
Sean Adams . Com - Electric meter reader
Circuit Monitoring
SAP seeks irrelevant executive | The Register
Windows 2000 on old computers with 32MB RAM
Hacking a SAP Database
SAP Network use
Whitehats.ca - Advanced WGET on Windows
www.fiber-optics.info
The Written Word
How to Use Lotus Notes on Linux with Wine
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
VisualCron - a Visual Cron / task scheduler for Windows
blog.var.cc :: backing up del.icio.us
Offline NT Password & Registry Editor
Review of Sharp Zaurus SL-5500 | Tux:Tops
WPKG, a Windows software deployment tool: About
pocketnow.com - Reviews - JDTeck JD55-PR Cellular Repeater - v3.0
RadTech Products - Portectorz - PowerBook & iBook Port Protector
Microsoft Baseline Security Analyzer (MBSA)
Learning PHP, Part 1
19 inch PC Rack by TykSak of ModZone.dk
HeadCold
db_rootkits_us.pdf (application/pdf Object)
"What"s your credit report saying about you?" from The Real Life Debt Blog
TravelPower Cases (Manual)
PEiD
The Mike Matas Blog: How to make a Life Poster
Just need how to do it in the gimp
Chris Linfoot - Fentun
extracting attachments from C.DAT, WINMAIL.DAT or ATT0001.DAT
broadband » News » Everything You Need to Know About Next-gen Broadband - New DS...
WikidPad - wiki notebook/outliner for windows
Using hp OpenView Omniback II GUI Via Slow Remote Connections (application/pdf O...
Origin of Storms - the blog project
Full Circle: A Brief History of NeXT
Judy"s Book
Macsimum News | Apple & Macintosh Related News Reviews & Opinions
Macsimum News | Apple & Macintosh Related News Reviews & Opinions
IT Resource Center forums - favorite sysadmin scripts you always keep around (3)
Jeff Hunter"s Oracle / Software Engineering Site
GNU GRUB splashimage howto
Unix Crontab - setting up cron jobs using crontab
Monitoring Hard Disks with SMART | Linux Journal
TipMonkies » Blog Archive » GMailFS, GMail drive for Linux
Breaking Firewalls with OpenSSH and PuTTY
Linux.com | A parent"s guide to Linux Web filtering
Home of nuhi - Projects - nLite
InfoSatellite.com - Windows 1.0 to XP: Screenshots
Log4sh
SourceForge.net: Project Info - RunAsAdmin Explorer Shim
a dog named fish - Lego Star Destroyer
History of Wall Street
EVDO Info, Coverage, Tips, News, EV-DO Products, Booster Antenna, 5220, v620, KP...
Database Systems and Tools
TOra
phpOracleAdmin - managing Oracle with PHP
SourceForge.net: Project Info - TOra
www.dsitri.de :: View topic - Guide to ConnectPlus on Zaurus
SanDisk ConnectPlus Wi-Fi 128 MB on OpenZaurus
The UNIX Forums - HP-UX boxes - am I mad?
Using the Oracle Universal Installer
Linux And Non MS OSes - Switching To Linux Checklist - OSNews.com
A Howto but not really more of a mantra, yes?
Macsimum News | Apple & Macintosh Related News Reviews & Opinions
docs.sun.com: Solaris Volume Manager Administration Guide
Recording the Alternate Boot Device Path
CyberGuard | Network Troubleshooting A Complex Process Made Simple
Q & A for Citrix Web Client
HowTo: Build a Complete Citrix MetaFrame Lab with VMware Workstation
Very nice.
Great Citrix vs. Terminal Services Article
Flash Tip: How password changes are communicated between Active Directory sites
User May Not Be Able to Change Their Password If You Configure the "User Must Ch...
docs.sun.com: Solaris Volume Manager Administration Guide
mirror drives
holgermetzger.de - Tips & Tricks
mozdev.org - portablefirefox: index
Solaris Patch Return Codes
Index of /clusters
SunSolve(tm)
CTX434260 - NIC Teaming - HPNICs with Cisco Switches
channel group not port group
NIC Teaming - Compaq NICs with Cisco Switches (EtherChannel) :: Tokeshi.com Thin...
channel group not port group
Flavio’s TechnoTalk » Blog Archive » Filesystem snapshots with unionfs
Burncenter
The Tenth Commandment of system administration
Backing Up And Restoring Your Dedicated Server With SystemImager | HowtoForge - ...
TipMonkies
Taskjuggler - Project Managers Delight - Home
Aris Global - Drug Safety Software, Drug Registration Software, Pharmacovigilanc...
Cyclone Commerce - The Collaborative Commerce Company
Safety and Pharmacovigilance Software for the Global Regulatory Environment
RTFM Education - Tips for Citrix
User settings issues are not resolved when you reinstall or repair Office progra...
How to install Office 2003 on a computer that is running Windows Terminal Server
Thin Client - Citrix and Terminal Services Resource Center
CTX145271 - PN.ini Parameters Deciphered
CTX331178 - Appsrv.ini Parameters Deciphered
Aximsite.com - The Dell Axim Community
OpenNTF.org - Lotus Notes and Domino Open Source Community
.NET Compact Framework Team : Updated list of .NetCF applications and libraries
Home
FreeCol: NEWS
WARZONE2100.COM - The Official Site
vocaro.com Dial Up Networking
..shadowmite: How To Use DUN
plaxoed! » Downloadr v 0.1 available for download! [Mark Jen’s life @ Plaxo]
www.bootsplash.org - introduction
Sed oneliners
How to backup your precious del.icio.us and Bloglines information - AviDardik.co...
Keeping $HOME (or /etc) in Subversion
kaos.theory: fractal blog » Blog Archive » 1001 ways to harden Linux
PrintFu - On Demand PDF printing Service. PDFs to Printed Books Print, Bind and ...
Yummy! Personal PDF Library
browse Zaurus_Project
Hack a Zaurus
Ruby on the Sharp Zaurus
Koshisms
The Lurker"s Guide to Babylon 5
Babylon 5
Babylon 5 Quotes
B5 Spoiler Junkies Archive
Science Fiction Timeline Site . . . Babylon 5 History Page . . .
B5TECH.COM - The Babylon 5 Tech-Manual.
Babylon 5 Encyclopedia
Podcast Bunker -- High Quality Podcast,30 Second Previews
Plot IP
Snort Technical Guide
The Hello World Collection
Must have programs for a USB card | Ask MetaFilter
BrickJournal - the magazine for Adult Fans of LEGO
CSS Panic Guide
Linux in an HP World
Librariana
Real Tech News - Independent Tech » The Truth About Lithium Ion Batteries
Embedded Linux Software Index
docs.sun.com: Browse Product Documentation
Why I teach Eclipse
Notes on SAPDB
SAPdb - Enterprise-class, Open Source Database
The Story of the PING Program
www.Irongeek.com: Irongeek"s Zaurus Security Tools Page
LJ105: | Linux Journal
externe.net/zaurus :: externe.net/zaurus - The latest and the best for your Zaur...
Ian"s Zaurus hacking page
Installing Perl on the Sharp Zaurus PDA
Zaurus Software Index
The K-Zone: Some notes on OpenZaurus
Craig"s Zaurus Stuff - Downloads
Zaurus Kernel Development
Zaurus Synchronization Repository
Zaurus User Group :: Zaurus Users Unite!
Wireless Card Support - OESF
Home - OpenZaurus
Zaurus Information
tekprosystems.com
Rod Waldhoff"s Weblog: Monday, July 21, 2003
Twingine
O"Reilly: Building my MythTV Box, Part 1: Hardware
Human Development Reports
fusor.us | home
Picking a Padlock
WindowsDevCenter.com: Navigating SharePoint
Main Page - LincityWiki
GCViewer
Garbage Collection
An apt-get primer
Home - Using SharePoint
cmdftp
Linux powers low-cost petabyte-level storage
USB multi-card reader woes | MEPIS Support
The table of equivalents / replacements / analogs of Windows software in Linux.
Network Notepad Homepage
123Macmini.com - Mac Mini News - Mac Mini Bracket
The Ninth Commandment of system administration
Xplanet
opencomputing » server side e-mail protection
txt2tags
ProShield - Debian Linux security program
Shell Script Library :: Wicked Cool Shell Scripts: Unix, Linux, Mac OS X, Bash, ...
IT Resource Center forums - favorite sysadmin scripts you always keep around &#9...
Metalshell.com - Source Code Examples ( Last 20 )
FileZilla Homepage - Index
The only ftp client needed
IT Resource Center forums - favourite sysadmin scripts you always keep around......
SAP Blog: MM Reopen posting period - MMPI transaction
AirSet - Shared Calendars, Reminders, Community for Groups and Family
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
Collection of programs for lotus. Wow
HEXUS.net : Review : ECS Production Tour 2005: How to build a mainboard, ECS sty...
How does a motherboard become a motherboard?
YubNub
Converting a laptop into a walltop
Moodss and Moomps
capacity planning
Mastering recursive programming
Welcome to HylaFAX(tm)
GNU/DOS
mrbarrett.com
BBC NEWS | Programmes | Click Online | How Skype and Kazaa changed the net
Using Unison to synchronise your work
File Synchronization with Unison | Linux Journal
unison-contributed-binaries/windows
Thursday Reading - Consumerism Commentary - A Blog About Personal Finance
BigAdmin Xpert Session - Solaris 10 OS Installation
Tech-Recipes.com - Add a user from the command line in Solaris
Walking on Windows with a LiteStep
ExplorerXP - Freeware file manager for Win2K/XP
ShellFront :: Where Shells Come Alive!
deviantART: Litestep Gallery
Dusty-Computing.com
Power.org - Home
Installing Adobe Reader 7 without unnecessary plug-ins or add-ons - Tweaks @ San...
Library Policies
Commodities - Materials and Waste Exchanges
nmr-26-kay.pdf (application/pdf Object)
YourEmblem- Make Your Car Unique with your unique set of initials. Better than c...
Homebrew Air Conditioning
The Subaru SVX World Network - powered by vBulletin
Subaru SVX .com
"You"ve got to find what you love," Jobs says
NTAccess replaces lost Windows NT, Windows 2000, Windows XP or Windows Server 20...
check_bl
Flavio’s TechnoTalk » Blog Archive » Hardening Linux: a 10 step approach to a se...
NewsForge | Pipes and filters
Linux Exposed :: The Linux Security and Hacking Resource - Case of a wireless ha...
Digital forensics of the physical memory.pdf
Lotus Geek - The Domino Developer Bell Curve
Wireless LAN security guide - By George Ou
Nagios: Home
Big Sister - Home
SCC
the Bleeding Edge of Snort - Breaking Snort Signatures
mp3splt project home page
HTTP-Request-Smuggling.pdf (application/pdf Object)
HTTP Request Smuggling
Handhelds.org - Open Source Operating Systems for Handheld Devices
Easy Service Marketplace - The Easy Frontend to the SAP Service Marketplace
Deploying the Solaris Operating Environment Using a Solaris Security Toolkit CD
mibDepot: Home Page
Podfeed.net : Podcast directory, podcast and podcasting resource on the web
PeteL"s Blog : 3 Column Layout in CSS
Sun BluePrints OnLine - Archives By Subject
Sun BluePrints OnLine - Archives By Date
Blastwave.org - An OpenSolaris Community Site
Home at OpenSolaris.org
Network Boot Server for SPARC
XML Résumé Library:: Welcome
Solaris Network Install from Linux
Fedora Project, sponsored by Red Hat
www.centos.org - The Community ENTerprise Operating System
Compiled directly from source for that other popular distro.
Knoppix STD: Tools
Damn Small Linux (DSL), 50 megabytes of penguin power
Boot KNOPPIX from an USB Memory Stick
Welcome to the Mepis Docs Project - Mepis Documentation Wiki
MEPIS Knowledgebase - A Community Supported MEPIS Knowledgebase
MEPIS Support | and Development
Mepis Lovers - For those who truly love Mepis!
The Opte Project
Free SAP Training and Tutorials
Planet SAP
SNMP - Simple Network Managment Protocol
IBM - How to Set Up SNMP for Notes Domino 6 in Windows 2000
Federico Pistono | Web design and applications
Linux.com | CLI Magic: Hexdump unlocks mysteries
thespot4sap.com. A SAP Community Website.
Oracle FAQ: SAP R3
ASUG: Welcome to ASUG!
How a Corrupted USB Drive Was Saved by GNU/Linux | Linux Journal
SAP for MIT
Mercury :: mercurysms
Venture Chronicles by Jeff Nolan
SAP Hosting
SAP Basis, ABAP Programming and Other IMG Stuff
Microsoft | SAP
SAP Professional Journal Online
Home
MaxDB™
SAP Fans Home Page: The SAP Fan Club and User Forum
SAP Design Guild -- Usability, User Interface Design & Visual Design
SDN - The SAP Developer Network
Unix Support - Sun - Keeping up to date
Planet Debian
Planet Solaris
Sun Microsystems - BigAdmin System Administration Portal
Planet Sun
Everything Sysadmin
Unix Review
RootPrompt -- Nothing but Unix
Solaris Patch Management: Recommended Strategy
Improving Security
Unix Support - Sun - Checking against patches
SUN patch reporter
Solaris Recommended Patch Installation
SAP INFO
SAPBASIS.ORG Welcome
SAPBASIS.ORG Welcome
SAP Security Authorizations - CMU FIS
Sharp Ideas: Pod slurping
PearPC.net :: News
Twin Mac - Your Dual-Boot x86 Mac Resource
Homebrew Air Conditioning
The Seventh Commandment of system administration
The Eighth Commandment of system administration
Podracer - The winner of the pod race - Home
KVpnc - KDE frontend for various VPN clients
Project Logger: Project Collaboration via Blogs!
The DSPAM Project
The Mint: Home
USB - 2.0, port, Hi-Speed, Wireless, OTG - Everything USB
BuildYourOwnMac.com | Take the Mac into your own hands.
Better Practice Guide - Security and Control for SAP R/3
Better Practice Guide - Security and Control Update For SAP R/3
Anonycat Web Proxy - Free Anonymous Surfing
Acronymn Search engine
Clemens Vasters: Enterprise Development & Alien Abductions - Why 3219?
Ultimate Boot CD - Overview
Bootdisk.Com
TI-89 Central - Emulators
7-Zip
Scott Hanselman"s Weblog : Scott Hanselman"s Ultimate Developer and Power Users ...
smartpm.org
Systems Support | Administration Tools | Network Installations| Solaris | Instal...
Solaris 8 Installation Checklist
Georg"s Brave GNU World - GNU Project - Free Software Foundation (FSF)
Symantec Enterprise Solutions
Linux Terminal Server Project
Business Opportunities Weblog | The Elements of a Good Business Plan
K12Linux in Schools Project - Home Page
KDE-Look.org
Hacking Billy Mouth Bass in Linux
Gmail: Help Center
Home - Sustainable Marketing - Green Organic and Corporate Social Responsibility...
SolarDataCenters.com - Web Hosting For A Better Planet
Home - Locomotive Media - Wind Powered Hosting
Elfon.com Your webhosting partner
Internet at the Speed of Sunlight! | ecoSky
Environmentally Friendly Hosting, Solar Powered Web Hosting, Reliable and Afford...
Tuxcards and KnowIt: Open source outlining
The Slack World, Issue 2, 2005. Slack Classes
Ping Tunnel - Send TCP traffic over ICMP
Version control for non-programmers with Subversion
Building a Linux virtual server
HTTP Time Protocol (HTP)
Osiris | Host Integrity Monitoring
SecurityDocs: Monitoring Network Traffic
Free wi-fi cafes & other wireless hotspots | MetroFreeFi.com
notestips.com :: Cracking WEP in 10 minutes
How To Conduct a Background Check
Freecycle
The Free Speech » Lire - A Log reporting tool installion guide
Get a Clue: Cisco Routers
New Computer Build Settings
Configuring SNMP in Cisco Routers
Welcome to California
ibiblio - The digital library
Internet Archive
Chrooted Snort on Solaris
tattle
ackerTodo
grepmail homepage
sukria.net - Backup Manager - A small Linux tool for making backups.
docs.sun.com: Solaris 8 2/04 Update Collection
Solaris8204
Werkema.com: Software: SpaceMonger
Brian Cryer"s Techie Notes ...
Tor: Download
unix_Passwordless_Login_PDF (application/pdf Object)
sshwindows.sf.net: OpenSSH for Windows
Windows Implementation of RSHD
Clay"s Utilities
Horst Schaeffer"s Software Pages
Hit any mm
TurboSnortRules :: Powered by VigilantMinds
Updating the Flash PROM on the Ultra 1, Ultra 2, Ultra 450, and Sun Enterprise 4...
Caesarea Scenario Club
Untitled Document
Caesar III Strategy Guide
The Governors Retreat
Caesar 2 Hints and Tips by Vaustein!
Caesar 3 Heaven - Senate
Caesar II - The Ultimate Site
Jim Watters - Technical - CD Lamp
Debian GNU/Linux System Administration Resources
Jumpstart.pdf (application/pdf Object)
RS232 Tutorial on Data Interface and cables
MSDN Solution Architecture Center: RFID Enabled Retail Supply Chain
Select a Product
Inside Workflow and EAI : Maintaining the ACID test in long running transactions
Think you know the Apple Newton"s History? Think again
Getting started with RHEL4"s built-in LVM tools
Use the Current Date in a Windows XP Batch File
Lotus Domino Administration in a Nutshell: Chapter 13: Domino Server Tasks and C...
HAVP - HTTP Anti Virus Proxy - The web antivirus solution
A guide to VoIP and Asterisk : Page 1
How to use your Tapedrive
1q04-mic.pdf (application/pdf Object)
Debian on Dell Servers - Confluence
glark
highlightedsearch
SUMMARY: L9 Autoloader configuration
Active FTP vs. Passive FTP, a Definitive Explanation
SCSI FAQ information with questions and answers on LVD/MSE, HVD and SE SCSI
Wireless Security Blackpaper : Page 1
Switching: VLAN"s
VLAN overview notes
www.SNMPLink.org - Other SNMP Links
C R Y P T O N O M I C O N
Japanese Slang
Learning Japanese
Ascii Art Dictionary (Andreas Freise)
Eleven SSH Tricks | Linux Journal
How to draw Celtic knots
The Linux keyboard and console HOWTO
IT cheat sheets for all
Absolutely Del.icio.us - Complete Tool Collection
exploitwatch.org - Exploits
PerlStalker"s SysAdmin Notes and Tools
How to Make a RJ45 Cable Tester
PatchPro Hub
Solaris™ Patch Manager
The Basics Of Telnet
Oracle Tutorials2
Oracle Tutorials
The Perfect Setup - Debian Sarge (3.1) | HowtoForge - Linux Howtos and Tutorials
Music File Processing on Linux
Easy Automated Snapshot-Style Backups with Rsync
Linux Maximus, Part 1: Gladiator-like Oracle Performance | Linux Journal
Reference Library
Introducing Oracle
rdiff-backup
Solaris Security Toolkit
Black Sheep Networks
Solaris Network Hardening
Understanding system log files on a Solaris
Lost Solaris password?
ONLamp.com: Understanding Filesystem Inodes
Certification: Passing the Sun Certified System Administrator, Part I Exam
Certification: Passing the Sun Certified System Administrator, Part II Exam
Glenn Brunette"s Security Weblog
YASSP: Yet Another Solaris Security Package
Memorial Day History
Buddhism -- The Four Noble Truths -- 4 Truths .com
Cluster your del.icio.us bookmarks
Grip -- CD Ripping/MP3 Encoding for Linux
Scott Granneman
LinuxISOtorrent.com :: Linux ISO Torrents
http://www.networkworld.com/news/2005/053005-firefox.html
BlockHosts - automatic blocking of abusive ssh hosts | A C Zoom
The Sixth Commandment of system administration
Asterisk Flash Operator Panel
OpenVPN - An Open Source SSL VPN Solution by James Yonan
WarDriving - Personal Telco Wiki
#/usr/local/bitshift
Wireless LAN Security & Wardriving - 802.11
WarDriving.com
MythTV
Welcome To Community Internet. | communityinternet.us
American Hiking Society
MIT OpenCourseWare | OCW Home
thebroken dot organization
from the shadows -- not tv. dot tv.
WEP Cracking Illustrated - hack a day - www.hackaday.com _
Roadcasting
Basic Guide to Dial-Up Fedora and SuSe - www.reallylinux.com
GNUsound
freeVikings - three monster-clobbers under GNU/GPL
Verizon Treo 650 Picture Transfer Workaround :: Blueserker :: Berserk about Blue...
Solaris Firewall, Example Installation & Configuration
configuration guide
ASZ_ASWPS_Securing_Solaris.pdf (application/pdf Object)
solaris 7
What is Usenet?
NACE
Automated configuration of Nagios Hosts
alienRAID.org - Xserve RAID in non-Apple environments
Four Hundred Guru--Admin Alert: A Lotus Notes Adjustment for Fighting Spam
Serial Links using RS-232 and RS-485
Gas prices average by state
Butterfly Gardening
Wireless DevCenter: Mapping the 802.11 Protocol
The Ten Commandments of system administration, part I
The Second Commandment of system administration
Linux Magazine
redhat.com | Installing Fedora Core on the Mac mini
The Third Commandment of system administration
The Fourth Commandment of system administration
Archives of HP3000-L@RAVEN.UTC.EDU
Spam Marshall - Server based anti-spam, anti-phishing and anti-virus solution fo...
SourceForge.net: Project Info - Perl Audio Converter
How to convert your Windows Server 2003... to a Workstation!
Secure and Private Browsing with Squid | HowtoForge - Linux Howtos and Tutorials
EarthLink IPv6 in the Home
What is Google Bombing?
IT Observer - Top 10 Security Checklist for SOHO Wireless LANs
Make your own RJ45 dongle for many PCMCIA network cards
FrontPage - OpenWrt
WRT54G dot COM :: Your Source for the WRT54G and the WRT Series
Fireplace Construction Information Site
SDN - The SAP Developer Network
Fix SAP OSS Notes
Blogebrity: The List
cheatsheet.pdf (application/pdf Object)
UFO: Alien Invasion - news
Bug Bash
Web Apps Compendium v1.0 || kuro5hin.org
milter-greylist home page
The Fifth Commandment of system administration
Mirrors - Linux From Scratch
The Tim Burton Collective
Dia for Windows
[A] m p a c h e : For the love of music since May 5th 2001
Fou4s - Fast OnlineUpdate for SuSE
Nagios PHP
SVNManager Homepage
smf-spamd :: Sendmail filter for SpamAssassin
SnortSMS Project
Rootkit.nl - Protect your machine
Sussen
Tag Logging Program
Welcome to logreport.org
lire
Logcheck -- Logfile Scanner
SMA - Sendmail log analyser
Will Filters Kill Spam?
UNIX Basics : Examples with awk: A short introduction
sed tricks
Spam
Symantec Knowledge Base
U.S. - Japan Joint Ventures: Problems & Prospects
Heiner"s SHELLdorado
Help! My Mail Server Is Being DoSsed!
Exit0Wiki - Rules Du Jour
Spamassassin rule updater
Logrep - General - ITeF!x Consulting
Sendmail cf/README - Anti-Spam Configuration Control
Reflections on the 25th Anniversary of Spam
How To Crack WEP – Part 1: Setup & Network Recon : TomsNetworking :
Tor: An anonymous Internet communication system
Freeciv - Freeciv
Xconq Web Site
Jason"s Web Thingy: Using VNC over an insecure network with SSH
Initiating an SSH Tunnel From Linux
KDE KMail: Secure Email Through SSH Tunneling
Zaurus links
Demystifying the sendmail.mc | Linux Gazette
Punching holes into firewalls
Main Page - WikiPodLinux
Squid Report Generator
NewsForge | The Fourth Commandment of system administration
SMTM Perl/Tk global stock ticker
FreeOrion
RoadMap: car navigation system for Linux and UNIX
Globulation 2 - Globulation2/Welcome to Globulation2!
Agata Report
sync2cd
www.logwatch.org
Excel add in ASAP Utilities free MS Excel tools. Add ins for Microsoft Excel 79,...
.: UNEASYsilence :. » Blog Archive » How-to: Phreaking your iPod (DTMF)
Sun Install Check Tool
MITRE - Our Work - Technology Transfer - Downloadable Software - Mobile Mesh
Partition Logic - Download
The Security Samurai
Waag Society - TOOOL Lockpick workshops
Steve"s RHCE Study Guide
Sysinternals Freeware - Utilities for Windows NT and Windows 2000 - NewSID
Sysinternals Freeware - Utilities for Windows NT and Windows 2000 - PageDefrag
Sysinternals Freeware - Utilities for Windows NT and Windows 2000 - BgInfo
Chrooted Snort on Solaris
Spyware Warrior (home page)
Similar stories Solaris Containers and Zones pdf
Anti-Malware Resources
Sun Solaris Tips
PublicRadioFeeds.com
CCC | How to fake fingerprints?
Browsershots
Know your Enemy: Phishing
Del.icio.us popular sites
The TCP/IP Guide - Table Of Contents
How To Crack WEP - Part 2: Performing the Crack
Predator at the Chessboard: A Field Guide to Chess Tactics
Essential bookmarks for web-designers and webdevelopers | CSS, Color Tools, Roya...
Server Oriented System Tuning Info
Nagios eventlog plugin for Nagios
PerfParse Home Page
Micro Persuasion: Kensington Lock Kryptonited, Company Silent
Internet News Article | Reuters.com
Grisoft Freeweb: AVG Free Edition
Flexbeta - AVG Free Edition 7.322
They still have a free edition
Notes411 :: Resources - KillDomino - Silent Version. Similar to Killnotes, zapno...
KillDomino after it has crashed
Welcome to Notes411.com
Sandbox - Mail Box Cleaner
How do you get rid of dead mail messages on the server?
Preventing spam mail in Notes/Domino 6
The care and feeding of your SMTP MTA (EasyPrint)
avail.cgi timerperiods patch
service level agreements
Compliance Solutions Advisor :: Managing the Business Risk of Blogs -- Complianc...
Video Resolutions: VGA, SVGA, XGA, SXGA, SXGA+, UGA
Owner"s Manual PDF
Service Manual
aaltonen.us :: View topic - Unofficial Dell Inspiron 600m FAQ
Can_NetWeaver_deliver_everything_I_need_in_the_new_SOA_world.pdf (application/pd...
How_do_I_get_from_todays_architecture_to_NetWeaver.pdf (application/pdf Object)
What_will_Netweaver_deliver_for_me.pdf (application/pdf Object)
Where_should_NetWeaver_fit_into_the_strategic_architecture.pdf (application/pdf ...
Why_do_I_need_NetWeaver.pdf (application/pdf Object)
Tactical_solutions_towards_strategic_goals_overview.pdf (application/pdf Object)
JSI, INC. - Tips & Tricks - Windows Server 2003 / Windows XP / Windows 2000 / Wi...
LinksysInfo - The #1 In Linksys Support and WRT54G Firmware
Tutorial: WRt54G SD card reader mod
What Color Eyes Would Your Children Have?
Mac Mini Surgery
Does Intellisync 5.3.2 support devices using HotSync 6, like the Treo 650 and Tu...
Download details: Windows AntiSpyware (Beta)
Download details: Windows Server 2003 Resource Kit Tools
Welcome to Script Center
OSLectures.pdf (application/pdf Object)
To Bruce Hutton very nice job
docs.sun.com: Solaris 8 System Administrator Collection
Notes/Domino 4 and 5 Forum : Error on Listen function: NETBIOS unit/lana number ...
IBM - Router: "Error Searching Mailbox File mail.box: Insufficient Memory - Rout...
maint46.pdf (application/pdf Object)
Admin guide
IBM - How to Manually Recertify an Expired ID
IBM - Steps to Reinstall a Domino Server or to Move a Domino Server from One Mac...
How does the Treo 650 memory system work (NVFS), and how does it affect me when ...
Palm Focus: PalmOne Treo 650 Compatibility List
Treonauts | Dedicated to your Treo 650 & 600. The Perfect All-In-One Communicati...
Treo650Faq: The Treo 650 Knowledge Base.
The Treo 650 (Can a SmartPhone Become My Main Brain?) Article
Your #1 resource for the Treo Smartphone
Got a Treo go here
Tom"s Hardware Guide Mobile Devices: The PalmOne Treo 650: Did You Say Phone, Ca...
palmOne - Products - Treo 650 Smartphone
Skype for the Treo 650
Flexbeta - Unofficial Windows 98 SE Service Pack 2.0.1
AFP548 - Putting the Fun into Xsan Fundamentals
Xserver raid Review
Apple - Xserve RAID
What Is...every file format in the world - A through E
review of Linux for the iPod
Mac Mini *COMPLETE* Technical Disassembly Documentation (PDF)
Mac Minis Disassembly
how-to record on your ipod (for free) - ipod hacks - ipod.hackaday.com _
PodNova | Better podcast delivery through PodNova. Search or browse the biggest ...
A Faster, Better Behaved Windows XP
How To Steal Wi-Fi - And how to keep the neighbors from stealing yours. By Paul ...
AirSnort Homepage
Default Password List
Linux on the WRT54G
Default Router Usernames and Passwords
Unison File Synchronizer
Wired 13.05: Cracking the Real Estate Code
Audacity: Free Audio Editor and Recorder
Power Shell Usage: Bash Tips & Tricks
foldedspace.org: Get Rich Slowly!
SSH, The Secure Shell: The Definitive Guide
The snailbook
Setting up passwordless, passphraseless ssh
The history of PDAs
Mac Mini FireWire Hard Drive Performance
Pocket PC Software suggestions | Tux:Tops
File System Forensic Analysis: PC-based Partitions
Linux in Government: Optimizing Desktop Performance, Part I | Linux Journal
Christoph Kugler Brightmail Presentation
Nice and High level
Browseable Online Backup Systems (BOBS)
Gambas - Gambas Almost Means Basic
Gmail as an online backup system - iBlog - Ilia Alshanetsky
Free Pascal - Home Page
AMANDA, The Advanced Maryland Automatic Network Disk Archiver
Bacula, the Network Backup Tool for Linux, Unix, and Windows
JPackage Project
Linuxmafia.com Knowledgebase -
SSH public key authentication.
Twisted Thought » Brightmail 6.01
Linux USB
USB.org - Welcome
Dan"s misc tech tidbits page
Cisco Ethernet Switch Procedures
Sendmail Home Page
Red Hat Enterprise 3.0 for Linux: Security Recommendations
Symphony Operating System
ONLamp.com: Setting up a Secure Subversion Server
FCCU GNU/Linux Forensic Boot CD
Cooperative Linux
Run linux kernel along side windows
TikiWiki : Winik
Linux on windows distro
GmailAgent - a local email client for Gmail
Tuxrip
HOW-TO: WRT Client Mode - hack a day - www.hackaday.com _
CDBurnerXP Pro - freeware burning solution | Home / News
Automating deployment with Subversion : Page 1
Lenz Blog
"Ubuntu Linux, Yellowdog Linux and Mac OS X, all on one PowerBook?" from The Int...
Oracle Default Ports
OR Soft - Advanced Planning Board for SAP R/3
Wired News: Blank Discs Not Created Equal
Schneier on Security: Combating Spam
Microsoft-Free Home Part 4: The Linux HTPC--ExtremeTech Build It
The Unofficial Fedora FAQ
SecurityFocus HOME Infocus: SSH Host Key Protection
NRH-up2date : the open-source up2date server
SecurityFocus HOME Infocus: Web Browser Forensics, Part 2
SecurityFocus HOME Infocus: Web Browser Forensics, Part 1
sshworm.pdf (application/pdf Object)
NMS @ MIT CSAIL: Secure Shell Shock
Zultys Technologies - Datasheet-MX30
FireTune: Speedup, tweak, optimize and tune Firefox easily - faster browsing, fa...
How To Upgrade RedHat Using RHN
Ron Nicholson"s Palm OS Computing Information Page
Vulnwatch: KSpynix ::: the Unix version of KSpyware? (Proof Of Concept)
Battle for Wesnoth
Spice Trade
Debian is Different
Seven Criteria for Evaluating Open-Source Content Management Systems | Linux Jou...
voip-info.org : Asterisk Linksys WRT54G
OpenWrt
Asterisk on OpenWRT part 2 - Lest Blood Be Shed
Free Online Graph Paper / Grid Paper PDFs
NSLU2 Linux - Main / HomePage
Review: Deep Inspection Firewalls
Mad Mac mini multimedia machine, Part 1: Load Linux on the Mac mini
Multivalent pdf Tools
HTMLDOC PDF-o-matic - Easy Software Products
make pdf of webpages
Acrobat/PDF Resources
Good collection of pdf related tools
Chris Linfoot - Getting started with enhanced mail rules
HOWTO: How to create mini kickstart CD for FC3
ynp"s Web Site - Solaris/x86 Page
Solaris Advanced System Administrator"s Guide, Second Edition:Table of Contents
Using Solaris™ RBAC
Solaris Infrequently Asked Questions
PublicVPN.com
Solaris Hints and Tips
The mrEriksson-Network
Sun-Specific Sendmail Issues
Creating Solaris Packages
Celeste"s Tutorial on Solaris 2.x Modems & Terminals
Solaris Tips and Tricks
SecurityFocus HOME Infocus: Solaris 10 Security
Guide to armoring Solaris 8
ITworld.com - The Solaris Security FAQ
Installing Sun Solaris Intel 9 UNIX For x86 PC Installation
Interview with Siem Korteweg: System Configuration Collector - The Community"s C...
SCC
Apache Tutorial: .htaccess files
Solaris Operating System - Freeware
Open Source tools/libs etc
SunOS & Solaris Version History
Little out of date
Customer Support - Product Documentation
Solaris x86 laptop list
Solaris troubleshooting
lookandfeel free software -- SAM Jr
EasyTAG - Tag editor for MP3, Ogg Vorbis, FLAC, MusePack and Monkey"s Audio file...
sunhelp
Solaris - Tuning Your TCP/IP Stack
Solaris Security Guide
OpenSolaris.org
Phil"s Solaris hints
Solaris Internals
docs.sun.com:
SunSolve Home
SecurityFocus Printable INFOCUS 1768
Snort IDS Signatures for SQL Injection, Cross-site Scripting,
How to modify and write custom Snort rules
Sean"s Toolchest
B o r a n C o n s u l t i n g : Good reads...
Writing rules and understanding alerts for Snort
Hentges.net / Misc / Openzaurus
OpenZaurus
SUMMARY: gcc problem in compiling Libpcap & Snort under Solaris 8
brandonhutchinson.com -- Linux, Solaris, and general UNIX notes.
NewsForge | Get rid of pesky backgrounds with the GIMP
Linux.com | CLI Magic: rsnapshot
Solaris x86
Linux Magazine : And Now, Something Completely Different
GROKLAW The Daemon, the GNU, and the Penguin - Ch. 7
Solaris on Intel - x86 FAQ
Solaris Package Archive
Solaris Central - News and Information for Solaris Users and Administrators
Solaris 2 FAQ
Freeware for Solaris
Ethereal
Ethereal User"s Guide
Google Groups : news.admin.net-abuse.email
Brightmail Spam Filtering Test
oracle_standards_and_procedures.pdf (application/pdf Object)
ISDweb | Documentation | E-mail | Concepts | Brightmail | Frequently Asked Quest...
Linux Magazine: Securing Your Environment: Part 2
Symantec Enterprise Solutions
Trial form
Michigan Engineering - Brightmail Anti-Spam
Symantec Enterprise Solutions
Bunny suicides
Home - The home of Spybot-S&D!
Ad-Aware SE Personal - Software - Lavasoft
TightVNC: VNC-Based Free Remote Control Solution
Setting up TightVNC and SSH on a Windows NT machine
plumbing home improvement repair remodel
Mrs. FIXIT Home Repair & Household Tips
Hybrid Center
Dissassembling the Oracle Redolog
Version Control with Subversion
Podcasting - wiki.ucalgary.ca
The Voice (over IP) of Reason - The VoIP Weblog - voip.weblogsinc.com _
Oracle and SAP - Development Update 11/2003
C++ Programming HOW-TO
Unofficial Ubuntu 5.04 Starter Guide
Oracle on HP-UX – Best Practices
State of Spyware
PARISC-LINUX
HP-UX Security Guide
The LiveCD List
HP-UX Reference (Manpages)
The OpenPA Project
SMUG? What Is It?
Index of the HP Encyclopdeia
HP: HP-UX Forum - Tek-Tips
Securing an HP-Unix Production Server
Interex -- Publications
HP-UX 11i, the Proven Foundation for the Adaptive Enterprise
comp.sys.hp.hpux FAQ
Porting And Archive Centre For HP-UX
Organic Lawn Care For the Cheap and Lazy
HP OpenView OmniBack II system requirements
Beechglen Development Inc. - Omniback DB Maintenance
Beechglen Development Inc. - HP-UX Technical Articles